ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:17 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "23a1fd5d785166"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f4c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f6c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f8c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x81, "358473b6ffe4f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000508c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050ac0)={0x1, [], 0x0, "cb8490e7f0b0a3"}) 22:18:17 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getegid() write$FUSE_CREATE_OPEN(r4, &(0x7f0000000340)={0xa0, 0xffffffffffffffda, 0x0, {{0x2, 0xfffffffffffffffd, 0xffffffff, 0x3f, 0x2, 0x2, {0x2, 0x3ff, 0x1000, 0x5, 0x4, 0x5, 0x7, 0x4, 0x401, 0x2000, 0x6, r5, r6, 0x5, 0x2}}, {0x0, 0x1b}}}, 0xa0) 22:18:18 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x0, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "23a1fd5d785166"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f4c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f6c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f8c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x81, "358473b6ffe4f9"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000508c0)) [ 347.331645] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [0xffffffff], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020}, 0x2020) getegid() 22:18:18 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "23a1fd5d785166"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f4c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f6c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f8c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x81, "358473b6ffe4f9"}) [ 347.444859] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 347.495188] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020}, 0x2020) 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 347.579065] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "23a1fd5d785166"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f4c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f6c0)) 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 347.686603] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "23a1fd5d785166"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f4c0)) 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 347.735791] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 347.814947] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 347.852591] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e4c0)={0xdbc, [{}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x1, "23a1fd5d785166"}) 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 347.945662] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 347.976870] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:18 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 347.989655] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e2c0)) 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) 22:18:18 executing program 4: r0 = add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x9, 0x6, r0) [ 348.085476] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.103615] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.116970] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.124072] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 22:18:18 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) [ 348.229125] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.243451] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.264507] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:18 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 348.274066] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:18 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:19 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() 22:18:19 executing program 4: add_key(0x0, &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 348.336281] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.360934] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:19 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) getpid() 22:18:19 executing program 4: add_key(0x0, &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) [ 348.455311] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) getpid() 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 348.499010] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:19 executing program 4: add_key(0x0, &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000080)="9ac5640e3986009ebc4d8116f25faa1dcb4c3cb0162262378062e5c31b41b12c882256db571987045663c5e12efdd2dd1ab9be48653f1936a1fae5379796981488d53254c955c9159a22d6a2ca7e38afc5e3517375fb41fdab81f058357df83c0fe8de0dad2c3ff81ad9e01374319332b326fa61ea97fcd1271c02a4654ef0393358fa126afba966f726a8755bc5a2d151f3d246f574a29c80658a9aff482eaf1605cd342ac7e28b91840bfbf3bb1fa8418d2cace4a50029ce82d93d36057b82ccfa129f2bd7860df0c9870a63ce666a2430510d988cf16d4c43bda7f06da4931da1884e1ca1761fde986ba61b0f0c11934a27e3a803df1e5e5d7ee1eb4bfcac8466556f03d65cb15cd305b3cb56daebdae5eef53f0a03d7087c6fd32248a193c707cd569a478907511437be7f2ad8127386081994a17eaa43ca7e083579c765c84d78d3439c6e5cba6c74dafda0ffb44678661cdd5b4949a57f3d0a054ea8b3d78b19c909f3e010b6765794b8ac17fe0295ff2ec410eed9ba032626a119aed2a740fa7b72ee0e1e792170394178a8573ff1e42238e93b73ed4502719be8e2b1716663e1c5b369acda47ad020100ef8587166b7639e80fd4103da78a4994ac1d54470f95549a4e6959a3fa6ae45deaac096f342cfa4406b18e2ed05666ab7b7aec33a8e45e7eb79e8e1e13fefcae5cc39b0e932e8c00af3ac195f5c05a43d29c0f13f37e0b080dafd0c18d6a7fc73423ecf0eb3ce4f78d42cd23db75ebab56682658241422774b3b40467fd9ff63be6828833506c7ec98b7cd4edf7b9e4761211fefa71be54c21a86c5c8c85022e8d691d07f6c8261cafedb0a1a760514b0b9979aa86a0a2ddf9069626952f69b06c74ff133c30eb6c2b60739c3972d569d9a021597156484b14443c80e4552373f6c98c65895fbb8c24af195e5907cfda8d302d7246ae7801ffd695c3e7ccefd398a894c3dad9dc07b1152dcaa0e380f93cff6d662419a379e02aaef0511cbcddc660444fa9fa2c506b76865b4760b9d4961e0503819e27a4aafdd736a32c1b087ccc6ebf799e58011b370419b912472b5e73c86843bef66f8c40becc91e87b7aec142a3bc0d7240c32db31a9fec470fa49001dff8f16146b057e0c542e3e4351157a987865bca113e5987efeed6f46a3f6dc0ab1d252a83e0c775038f4fb8bab59f46c47d34f1ec56a7f05eb3d77d1feda12cf7377fa9f83ce0bc1b55573b72c37e57e689fc6aaa6b4028206fab8770b43337bcd69d67775737c75ab5ab99dae7b4c27297205f8c7f6580fba8819cfebd8be160439cdfc2ae8df1b8e3856a8cf8ed4a8948e230ac24ba455d3ceed1b98876f34ae8ce3cdbd17688b855f588f97f83f956d94e82991529b2dd516f2356aaf6da13ecb1be83b6fe597f79488d9612cd60fe926b98863179742d9a73f15feb9ed33d2a03f52c1adf57fb11bba1337b1e68933df7da606439c7d6657da7d2898415b39d0147272758b7f2c14e2225aa7536f522b8a5a1a1c93acddaa94eabecc02ae415cc33b58b273b692fde91da36792ea9ee05e535778ce0d45f84f3e5d4868085fc5de582b743b409356bd3e0521c702baaf5bf12dc59b2f9d2a401e0d945d3ea37cc13ef6e1f54801dff91c35746cb6b1d431c3102c40cb5427f900fecf9b3cce455851196f63b49b408b485d54f6c50dcd5fe9ac189880c3ef8aa2b369087f2f34310004c8e2caeb02389d870c868270de784ff81d8b04c5f735c16838199806c4dd343ed68f1b112b3a662b343bd32b9e87a70dea8944f1ff64636691594956989ebb873aad5b2aa69713ada74eb10dab7d4603d7dbc01f949bb34f361f4cad4d82f68730f28dcf8213b84389dc900434fd65dee8fce7c68dcdb7b978ad57f0f0532f0418f4c9500ac69d668b3ac127dfb4c5568fb68c6fa445157b162ffb2e5cd6cddf97379b9e2e74c92a7172a4c937eaea8a07a6e53f58c6b888063fc792d0c4c7f6abd2ef5edc6d9234882dd6a3601dd5238e60f43571269d13127f1e88037c6fcf877d79c04fb2a459f33ce20f1e631dbc98754ef212128a237024693c076ce2b7b8d94dd537a6b7d999e7701ef5dfd7b5064be8c5a37a43e1ba8854ec4655eec37592375e7e94e33db55f430b0bbca42b96e64aa42bfa253ee94a400cf89ab190ec06177d47a733f13b3aeed879a260062b8f802917c1309a1cdbfc3ef1793a5e6b62601f782433ab8fcb8ce096761449225dc7a3c1b77e68b12a1b5c201d38d5c380f37b4f662fe49088967daa79b6479c5bcd71901fc55654bf0d62673276734c0e67a82ab77cc662a063daab03dc117c159df279ab9c616bcdac74dea95c601686d2f9217b2160db7591f21d2bdfe48958af9af2c62c5e36366f32679b76889645f2f11f8fc904a5fc1dfee756d3e79d94c2710f8e0fedc2fc9ba8ed768f91f7d909a4af5118acea72df1998f999a852e777781655b34b37d78bede033d5b9ab4e4dc7bebfb0b84e7039281e09651a0441e75e587f93b3d8f12e88635cd5148e4a818b2f74587a35af580d6ce246c9286cc90607ea5b9cfaba6922097aa629e8f67b8361b5483d219f4bdab6407158ea70275854398c6bc527d150becbb4ebd83e6ff2dd27e3b2a48556b9e3c82a235e0771f2e0b2cdc03ed9df2f1c6601f0f5f8857408a3cc6ca505ccb8dfad354d4e0c2efc43dd07b2e5ae4eb05da28a0c0309e51f0631ef253efcd2e1724387455cfd4d60c7d9349a0d336682454d30f7d853a9b9618f2cb899f85e4fe72cf2053f23b49736350be034a12b79d5b5366b1f3833f0e5d9b8815f66c5d392d8019637dd18626a68d91eebb205afdd5fef457a424554e5a88a3c790d7beb0bb656631a9f84beee5cd3c2376cf93ca58dd8ec977d013710fcd987efbb014cec80196e89dc3d949eb997c89f9eec5f7a4f99fea3764101acbfc3f5846ad95f01e130ad74d1bb1ffda59602c5758c9130a404e7eb21cea6ed377742ca0833dd0c62f64ad123e29bed0366cdfde4924e53955817297584b99a14a408fb2cb259d27d6c2d8076219c35383de947a243be311a0ca1b0af2ca6207789977e718fe52772ebad6acbada6d78499a1505959f3feab184bc650799cc6f7bdc523a4b011fbfc94cc53a6c439d826e68077a65ac6815e9f3e14a7cbdf4eb2fb6d81987bd67db1c6b281bc2bac9c823b244f0bdba37cef38171d0ad73add8cc8b5947da423dbbd43799d2adc381b1207c073e840e287813feda80c90a44db86178bf556be193787576815aee11c520ea9b838b64efc27b1210479380ede6b665823b7eb7845814f8ece61bee5756600bfacc1058b993d69adbfcc2997adfae5ee573fe9eaa9b95bf0828d27f262681eb5033f891963ae176859553ae120f457e9b7c55f2ff319a5e8183f37b8ca3f5b19fc2644ebbd378a65523fcf983517d765e88937cfaffa372f611d80780e0ade24fbf4fc24db1dc5dc4ebdabe8bcebb373d26a6123cbb29ce76523742594f93b8fc9e02d3cd77fced8ac4d81acddda5938b86445f3a74b6acee4b43a30fbd5665e01bcf49d97807becabc66dc31de8ba8792122ed4de7043495146a6b9e141227d5e9fbffea700bb51ccc47e33ec747caa1b9d237280f79867e115da3c6d959989519eacf4096c9e494afb44bd4ea7ea24902485ef7c7c3124aed60f5eb55c0d55134402e95e44859732e2c6fd400e19c840848fb6370ea3ab47a818087d6b27096516d3b4338748257862a099023ff08db0c34457d17534f0061d3e74dcca60e1d3a69b56d4eca9902f7c5f4284c67ea36099bc4509d04261b26df1bf729e87f3bd41525ac9f038b5d18e07ef4b857efad57f22dceafa7272fe7ce75ac8f35883522b9f566d11440f8ecd7f1dd6df49cb328505ca54ae42a6e00e6754f061a8eda2dca02915480585c9d77e9c48647ede352aab5704b64b428956a0db3b6772cf9d37a15ebf9004ffae58d073195d2d74a799a0cfbe605d808c29181bc64adc841481498b886afb89b25dc3cf279d5c61a2e95c14cf25c7c6650db60e75726a2f155ddecdbe600db2f55c49bd3781d7669ced864095328c1f79d0b648ae607a20f6d482a82e4afd7e2c10a26ce3f372a2febbd4ecfbcadea04b1743bcfb00d9b8b67702308f929649793e2c0cd033228499bf1ed0e8146b77f1de51d4b885762b7466255572637df22ddbf59faa587cef33973c0c0425f0cb3309707a576a3a823a6e98967b0262dbc8296e084f20dd0058b15b826003095c4eb686495d21f935e18770c301ef0394d6af96ac7cc7c79166eaac50134c7776934a4f8ca726896ac3314f7664ca828a00354f6dc6eeeb5539fe5b7d015c776a23228e657c54ece764d4d6784f8d48f9de0dc5f5e61f7394f85a74e0c6f339d04dec9ecf948deb6e1e9776f3a53b02739cc2c0c3e72ff9fc414422bd3df1b95ef9ac063afe59ff35f65cec3d41408448e3e814a2bd2b1a85be2a5713afc6b2ee83f65d1ff27d8cd441abafde498a1419ab8fd49254d53579dd4c667ebcc0b7452f889ce168dd8835d8aca87d256dbbae6ab8db91d2c25db6aff42c5c64161ec59a35d4630ac151e206075b7f834c5b692de39282ba47e7fb458eb66a0ba00268f906ae3ad2b002b0a6e408206f199328c8adf90b0fcbd559dfadcc7a934440b5f2d85f093b04cb74e2c93576404bf249049b399b0226116ee9e60e3a70d73d7106e78008511f724d80c954c89e556c063792405544b6101f7c7a9f2b16822428f84552c6579efd267198838a38dc78f3a7cc88d724036c1088c9ee8ba9e08d9bca4dae0c3b69ff8733f292e24d32f167a7da1f2f982bdea6cf972c9aad9ec100720bf3eaed99bf2f06f7a5ef7e9b50754c57c574ad5edf2fbdadb06ef411507927519e4a04bf045ac7bc0a14eeba73bc917935d463403425236eed3dafb18d357f20f17a025ce3549b32ac5aa761943ae63c92c8668d74509ddae4473a51fc968071908d839400ae6247cf360ca1f97ba715138e7df5449c7fc5c4e034da8185072a72b19075e759bff4f33eee11366e81f8780951b7e40f1c1ec549ac31073542851581054ca85bcd727c793cd3b305aa64efdf293e2fcafedc5bb4cba7a1babcbdeb9d873dfc0196ed4d911a2a170ad89ee1df9e2f2064012de896d6a0531c4df749200dbd6e2f41d84043563c7a8dc109ab64fb26cf29859f7fa43ec4ad149a264f8b747503338b960f6c17e698af1e37f1e9fa613ea7898bd87cd2a86b9e51db175a0298bcfdc7349155aa0684ed4be825856a0ebb459efa69481698196d5897a4343e62763a720f9c2e8e33fa612d93c3bea51ce2917ee2465c116a401831335c9545f361c5fc4db93dd15e7ba8265503f562b90dedeac8c67bf6b3e718f444067c5c063b1d391842fa5df088ec4dd2bc5573ee3c975ddc516744fce6c0a4665b72cab3a9ea06778e4885f79a3528e507cfd8ed47edda73dc88293f4cac1c48afb28f2bfed6bf06fccade6ec07a58b5c8fb696c97cbaf5367d0d56ae019d337982cd459a4033d46a438e2d8e957b787925b461f1c48155012b12a93bd716541120c746d644ff2ea580df9aacae4b6da8b844194948fbe1ac125ee3c1f80e470fe5978f797a0401d1601495bac136aeab24b6d6ea945b7b5c04b4627925f3ae9f460ff6995ff3821dcb68b07ffc14777c74c600d1945c1aeaa39cd5f346c7d217eb148544bf99924c1c4e761df8c7ff6b809e425231f73acbcad4f21c792f9b49f18b46713d599f4e", 0x1000, 0xfffffffffffffffc) 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:19 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') getpid() [ 348.595804] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffc) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) [ 348.678472] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') getpid() 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x0, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 348.745842] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:19 executing program 0: getpid() 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 348.841743] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.850067] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.875308] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x0, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 348.968327] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 348.981905] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 349.024069] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.050500] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:19 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 349.115028] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.136036] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.149246] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 349.207743] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:19 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:19 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:19 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 349.255527] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.270624] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.275621] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 349.367784] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.392035] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="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", 0x800, 0xfffffffffffffffc) [ 349.418972] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:20 executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 349.494255] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 349.556077] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x0, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 349.628761] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 349.715516] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.727309] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 349.768642] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 0: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 349.855971] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="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", 0x400, 0xfffffffffffffffc) [ 349.906508] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 349.929171] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 350.036471] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.080461] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 350.135727] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 350.183571] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.204664] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:20 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:20 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:20 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 350.287165] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.327364] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.327832] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="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", 0x200, 0xfffffffffffffffc) 22:18:21 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.415656] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.440509] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) [ 350.474175] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.486890] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:21 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.562349] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.597864] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.632946] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.652381] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.697333] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 350.741275] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.767091] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:21 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="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", 0x100, 0xfffffffffffffffc) [ 350.799178] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.828104] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:21 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x0, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.897581] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 350.924873] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 350.976591] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.016390] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 351.040170] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.065101] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) [ 351.120041] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 351.169655] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:21 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:21 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:21 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:21 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 351.263730] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e3986009ebc4d8116f25faa1dcb4c3cb0162262378062e5c31b41b12c882256db571987045663c5e12efdd2dd1ab9be48653f1936a1fae5379796981488d53254c955c9159a22d6a2ca7e38afc5e3517375fb41fdab81f058357df83c0fe8de0dad2c3ff81ad9e01374319332b326fa61ea97fcd1271c02a4654ef039", 0x80, 0xfffffffffffffffc) 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 351.381326] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.401614] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.423254] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) [ 351.565141] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) [ 351.678543] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e3986009ebc4d8116f25faa1dcb4c3cb0162262378062e5c31b41b12c882256db571987045663c5e12efdd2dd1ab9be48653f1936a1fae53797969814", 0x40, 0xfffffffffffffffc) 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 351.826872] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.843037] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 351.906189] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 351.917978] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 351.955997] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:22 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [0x0, 0xffffffff], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 352.004429] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 352.086645] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 352.090456] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:22 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 352.145829] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:22 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:22 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) 22:18:22 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:22 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e3986009ebc4d8116f25faa1dcb4c3cb0162262378062e5c31b41b12c", 0x20, 0xfffffffffffffffc) 22:18:22 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) 22:18:22 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) [ 352.282955] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 352.292306] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:23 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 352.411961] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 352.448428] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:23 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 352.558445] x_tables: ip6_tables: esp match: only valid for protocol 50 [ 352.577686] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {}, 0x16, 0x6, 0x1, 0x1}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 352.656770] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e3986009ebc4d8116f25faa1d", 0x10, 0xfffffffffffffffc) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) [ 352.746226] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) 22:18:23 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) [ 352.893483] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) 22:18:23 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) [ 353.025634] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:23 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() 22:18:23 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:23 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:23 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r0}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e3986009e", 0x8, 0xfffffffffffffffc) 22:18:23 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:23 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:23 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:23 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:24 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x3, 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) [ 353.436159] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:24 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002d80)={'erspan0\x00', &(0x7f0000002cc0)={'gre0\x00', 0x0, 0x40, 0x8, 0x8, 0x8001, {{0x26, 0x4, 0x2, 0x8, 0x98, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @private=0xa010100, {[@timestamp_prespec={0x44, 0x24, 0xf3, 0x3, 0xc, [{@local, 0x7fff}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x200}, {@empty, 0x8}, {@private=0xa010100, 0x100}]}, @noop, @noop, @cipso={0x86, 0x4d, 0x3, [{0x7, 0x7, "52bd8e53d3"}, {0x2, 0x12, "591bdf5dd8e87591f0a704e6efb5860a"}, {0x6, 0xd, "5b047a68ec39764d2e3c9c"}, {0x5, 0x3, '?'}, {0xe, 0x2}, {0x2, 0x12, "cf8a030cde52bf275267c578fb4257c3"}, {0x2, 0xa, "09632fcadf69c50b"}]}, @generic={0x3, 0x4, "928c"}, @cipso={0x86, 0xc, 0xffffffffffffffff, [{0x7, 0x6, '6J5\r'}]}, @noop]}}}}}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000002ec0)={&(0x7f0000002dc0)={0x1d, r1}, 0x10, &(0x7f0000002e80)={&(0x7f0000002e00)=@canfd={{0x1, 0x1}, 0x1e, 0x0, 0x0, 0x0, "2e3b2fa4d4ed379661adbb6cc5edced99c0c188ca182631cdf64522b3fae937bee4b700ef212c89a23d29aa3ccca01baffc0fd9df72400f2a80455c6dcb39c61"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) getpid() sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000024c0)={0x14, r0, 0x1, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x208400, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getegid() write$FUSE_CREATE_OPEN(r4, &(0x7f0000000340)={0xa0, 0xffffffffffffffda, 0x0, {{0x2, 0xfffffffffffffffd, 0xffffffff, 0x3f, 0x2, 0x2, {0x2, 0x3ff, 0x1000, 0x5, 0x4, 0x5, 0x7, 0x4, 0x401, 0x2000, 0x6, r5, r6, 0x5, 0x2}}, {0x0, 0x1b}}}, 0xa0) write$FUSE_DIRENT(r3, &(0x7f00000001c0)={0x60, 0x4e829f39d42dd8f9, 0x0, [{0x5, 0x100000003, 0x1, 0x202, '&'}, {0x0, 0x10000000, 0x15, 0x7f, '/proc/self/net/pfkey\x00'}]}, 0x60) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 353.477515] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5640e", 0x4, 0xfffffffffffffffc) 22:18:24 executing program 3: socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x3, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) [ 353.580955] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x18da01, 0x0) 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) [ 353.787887] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) [ 353.920181] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9ac5", 0x2, 0xfffffffffffffffc) 22:18:24 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x3}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00', {}, {0xff}}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x18da01, 0x0) 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 354.074374] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) [ 354.117875] x_tables: ip6_tables: esp match: only valid for protocol 50 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:24 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x4, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) 22:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) 22:18:24 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:24 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{}, {0x0, 0x0, 0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000480)) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) 22:18:25 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:25 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080)="9a", 0x1, 0xfffffffffffffffc) 22:18:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x32, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) 22:18:25 executing program 5: socket(0xf, 0x800, 0x10000) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xca}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008880}, 0x40040) 22:18:25 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:25 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x10001, 0x80) syz_open_dev$vim2m(&(0x7f0000000280)='/dev/video#\x00', 0x13f, 0x2) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x8000) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f00000002c0)=0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r3 = socket(0x28, 0x4, 0x8) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f00000003c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x30, 0x3, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4814}, 0x1) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:25 executing program 5: socket(0xf, 0x800, 0x10000) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') 22:18:25 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:25 executing program 5: socket(0xf, 0x800, 0x10000) 22:18:25 executing program 4: add_key(&(0x7f0000001080)='keyring\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:25 executing program 0: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:25 executing program 5: socket(0x0, 0x800, 0x10000) 22:18:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) 22:18:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x2, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r3, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r5, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x6, &(0x7f0000000240)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x0, 0xa, 0xc, 0x80, 0xfffffffffffffff0}, @generic={0x60, 0xb, 0x8, 0xe0d, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000280)='GPL\x00', 0xfffffbff, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x9, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x8, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000000000000950000000000000018130000", @ANYRES32, @ANYBLOB="0000000000000000181a0000", @ANYRES32=r2, @ANYBLOB="000000000000000085000000070000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x8, [], r6, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x5, 0x2}, 0x10, 0x0, r7}, 0x78) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:25 executing program 0: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) 22:18:25 executing program 5: socket(0x0, 0x800, 0x10000) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'gretap0\x00', 0x0, 0x700, 0x1, 0x8, 0x0, {{0xc, 0x4, 0x0, 0x9, 0x30, 0x68, 0x0, 0x81, 0x4, 0x0, @rand_addr=0x64010101, @empty, {[@generic={0x83, 0x5, "49f156"}, @rr={0x7, 0x17, 0x2f, [@broadcast, @multicast1, @loopback, @multicast1, @loopback]}]}}}}}) 22:18:25 executing program 4: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x545a00, 0x0) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x1f, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:25 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:25 executing program 5: socket(0x0, 0x800, 0x10000) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) 22:18:25 executing program 4: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:25 executing program 5: socket(0xf, 0x0, 0x10000) 22:18:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020}, 0x2020) 22:18:25 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 5: socket(0xf, 0x0, 0x0) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r3, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r4, {0x4}}, 0x18) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020}, 0x2020) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3, 0x4d2], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x27, 0xa, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r2, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, 0x0, 0x0) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020}, 0x2020) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r2, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002100)={0x18, 0xffffffffffffffda, r0, {0x7c}}, 0x18) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000021c0)={0x3, &(0x7f0000002180)=[{0x8000, 0x0, 0x7, 0x9}, {0xa4b, 0xff, 0x0, 0x1000}, {0xb355, 0x33, 0x7, 0x80000001}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x27, 0xa, 0x8) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) socket(0x27, 0xa, 0x8) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[0x4d3], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) 22:18:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) socket(0x27, 0xa, 0x8) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r2, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r3, {0x4}}, 0x18) 22:18:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) 22:18:26 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socket(0x27, 0xa, 0x8) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x27, 0xa, 0x8) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 1: socket(0x27, 0xa, 0x8) 22:18:26 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 4: socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:26 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:26 executing program 1: socket(0x0, 0xa, 0x8) 22:18:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) socket(0x27, 0xa, 0x8) 22:18:26 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:26 executing program 4: socket(0x0, 0xa, 0x8) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:27 executing program 1: socket(0x0, 0xa, 0x8) 22:18:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) socket(0x27, 0xa, 0x8) 22:18:27 executing program 3: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:27 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket(0x27, 0xa, 0x8) 22:18:27 executing program 1: socket(0x0, 0xa, 0x8) 22:18:27 executing program 4: socket(0x0, 0xa, 0x8) 22:18:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x108, 0x148, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}, {[], 0x1}}, @common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 22:18:27 executing program 1: socket(0x27, 0x0, 0x8) 22:18:27 executing program 5: socket(0x27, 0xa, 0x8) 22:18:27 executing program 3: prctl$PR_SET_NAME(0xf, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000002140)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:27 executing program 4: socket(0x0, 0xa, 0x8) 22:18:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 5: socket(0x0, 0xa, 0x8) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:27 executing program 1: socket(0x27, 0x0, 0x0) 22:18:27 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:27 executing program 4: socket(0x27, 0x0, 0x8) 22:18:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r2, {0x4}}, 0x18) 22:18:27 executing program 5: socket(0x0, 0xa, 0x8) 22:18:27 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x218, 0x218, 0x148, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xb0, 0x4, "a3b87e3529b627d9abbf35d0da0d4257bbbfa9ab3b24b25bde1846abb02b"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'tunl0\x00', 'team0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "eb70c1a6e24f050f40d2833121ceb12151bd68f3b7e04d934ee160f40b29"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 22:18:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:27 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:27 executing program 4: socket(0x27, 0x0, 0x0) 22:18:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x4, 0x6, 0x2, 0x8, 0xffffffffffffffff, 0x3, [], 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x40) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = socket(0x27, 0xa, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000002800)={&(0x7f0000002740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x14, 0xe, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) 22:18:27 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 5: socket(0x0, 0xa, 0x8) 22:18:27 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:27 executing program 3: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) socket$bt_cmtp(0x1f, 0x3, 0x5) socket(0x4, 0x1, 0x0) 22:18:27 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:27 executing program 5: socket(0x27, 0x0, 0x8) 22:18:27 executing program 3: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) socket$bt_cmtp(0x1f, 0x3, 0x5) socket(0x4, 0x1, 0x0) 22:18:27 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x3ff, 0x0, {0x2, 0x8000, 0x6, 0xfffffffffffffffe, 0x6, 0x8, 0xfffffffa, 0x1, 0x7, 0x1000, 0xfffffffd, 0x0, 0x0, 0x2, 0x6}}}, 0x78) 22:18:27 executing program 5: socket(0x27, 0x0, 0x0) 22:18:27 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:27 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:27 executing program 3: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) socket$bt_cmtp(0x1f, 0x3, 0x5) socket(0x4, 0x1, 0x0) 22:18:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) 22:18:27 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 3: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) socket$bt_cmtp(0x1f, 0x3, 0x5) 22:18:27 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 3: socket$bt_cmtp(0x1f, 0x3, 0x5) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:27 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, 0x0, {0x4}}, 0x18) 22:18:27 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:27 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:27 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:27 executing program 3: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x545a00, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000440)) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:28 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x2200, 0x0) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) socket$inet_smc(0x2b, 0x1, 0x0) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) socket$inet_smc(0x2b, 0x1, 0x0) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) socket$inet_smc(0x2b, 0x1, 0x0) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, 0x0, 0x0) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, 0x0, 0x0) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, 0x0, 0x0) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, r2, {0x4}}, 0x18) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, 0x0, {0x4}}, 0x18) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, 0x0, {0x4}}, 0x18) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, 0x0, {0x4}}, 0x18) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, r2}, 0x18) 22:18:28 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) 22:18:28 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:28 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) 22:18:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:28 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') 22:18:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) 22:18:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, r2}, 0x18) 22:18:29 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) 22:18:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) 22:18:29 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) 22:18:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, r2}, 0x18) 22:18:29 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000180)) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) write$FUSE_GETXATTR(r1, &(0x7f0000002640)={0x18, 0x0, 0x0, {0x4}}, 0x18) 22:18:29 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 5: sched_rr_get_interval(0x0, 0x0) 22:18:29 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000440)) 22:18:29 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:29 executing program 5: sched_rr_get_interval(0x0, 0x0) 22:18:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 5: sched_rr_get_interval(0x0, 0x0) 22:18:29 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:18:29 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000002640)={0x18, 0xfffffffffffffffe, r1, {0x4}}, 0x18) 22:18:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='@w\x00', 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000280)="4c4c245f9b74617374078b2e64821c792abd835f9ebdc6cc176d218923685d16536c3641371f016904ac0323bbc80a98bc8fb643666a5f02bc7c9de884dbbce4cb5d31bc351ac7388619d098802114a6c88143417466a1c66dad1f9232b014239597d02bcb5fd7b082498f4161947a941eb1d9076952c2fb606f208c598500838b5b27345b988e3c6d98284e6fef4d7a486911b73957b1d0de4395aa59f943b12f86ab00ca15ecf683cdc1d8e7d8fb05ec24f2436d0557d28eee989dac900762606cedffe9448623", 0xc8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @private, @broadcast}, &(0x7f0000000440)=0xc) 22:18:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 22:18:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:29 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:29 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:29 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) getegid() 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) getegid() 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) getegid() 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) getegid() 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x80}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getegid() 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x707000, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) getegid() 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getegid() 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') sched_rr_get_interval(0x0, &(0x7f0000000180)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) getegid() 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x88\xe1\x98\xf4f5\xec^7D>7dC\x14Y\xae\xf4B6c\xc2q^p\xe8&k\xe6\xea\xcb\xa9\x18\xb2\xed\xcd\xfdA2\xf0\xbbe\xde\x0e\x11\xbc\xf7,g\xec\xe0zM+L\xb6\x8b\x15\xc8\x98TM\xd3\xe5\x04\xb8\x14P\x91-\x14\xd9$\xc8,p\x0f\x1e8\f2\xe6\xd8&w\xd6)\xb1\x8e\x1fN/.:\xc6\xe6\x80\xd6\x17\x87/\x85U\xec\xe2>\x8d\x8cc\xe5\xe7\xd7\xe2,\xf7\x1a\x06V\xe8\xb7\xc9|N\xfb\xca\x9b\xb0\xcc\x12\x1a\xa8\x19q\xe9#(\xc1\x80\xc3\x94\xec\xf5\xd7q\xf7f5\xb6\xee\xc2\xe6\xe5\xba-\x0e\f\xe1\xc0\xeeV@a.X\x04C\x1bx\\)g\xafPEyP\xe4\xeb\xf5') r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) getegid() 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) 22:18:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) getegid() 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) getegid() 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) getegid() 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) getegid() 22:18:30 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:30 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getegid() 22:18:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:30 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:31 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:31 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:31 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) getegid() 22:18:31 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 5: socket(0x2e, 0x0, 0x0) getegid() 22:18:31 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:31 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 22:18:31 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 5: getegid() 22:18:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:31 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:31 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) 22:18:31 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:31 executing program 4: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 2: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 2: socket(0x2e, 0x0, 0x0) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 4: socket(0x2e, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 2: request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 5: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) getegid() 22:18:31 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 2: request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:31 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) 22:18:31 executing program 2: request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 1: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$clear(0x7, r1) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) r3 = request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', r1) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="3f70c3447a2d05d49798a78c2ed826e6317ff0c5624f67bbaaa3e6fc97cc3fdae22ca50ed5615df8b4b91f68a5faec37699bac74aa645229d72d39d048d76ce7fe00c44a2f2196aecb27d964623276d8c8a73c08f03af6302a417df244ec8a205a9fed02fad899ede61d1f34a50d591bd38968a0638b803f1f1c819d2671850fdb2537627c05de893d6dbcf183dc35824ba1309b7304d70334d5d69d5cfb7bd934cf78351e98074c83d608b80be39a266b9546bffdadd24b99e22c9dcae83ebd13df2b822230e6fe95b3e48fc0d3030516fcd3794471", 0xd6, r3) getrusage(0x1, &(0x7f00000007c0)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x1000, 0x4) r5 = getegid() keyctl$chown(0x4, r1, 0xee00, r5) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:31 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) r2 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x0, 0xfffffffffffffffd, 0x95, 0x3, @scatter={0x1, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/200, 0xc8}]}, &(0x7f0000000300)="06cd9e03dc52b5a0056dba3a7063959c5c3d3b38bd69d94b8a3141c8b9a5427312088ddecd38002df4bdc14414370b76f441a1bc74a3ae9f94bb0f3dec7c341868614c84fef33afef306bf790147f8b9fa6d58a279f7ba6f15315300bab90c935f1a4678203c174c2134e91b1828b10979132c147d21a220efd090920cc6b0cc309dc34ca2ee3ae6e7d49108e7f35b7e406bdeaca7", &(0x7f00000003c0)=""/24, 0x20, 0x2, 0x3, &(0x7f0000000400)}) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:31 executing program 2: request_key(0x0, &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x7fff, 0x551a00) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:31 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 2: request_key(&(0x7f0000000640)='blacklist\x00', 0x0, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:31 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000100)={0x281, 0x2}) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:31 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:31 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 2: request_key(&(0x7f0000000640)='blacklist\x00', 0x0, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:31 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:31 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:31 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:32 executing program 2: request_key(&(0x7f0000000640)='blacklist\x00', 0x0, &(0x7f00000006c0)='/dev/sg#\x00', 0x0) 22:18:32 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5", 0x5e) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) 22:18:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:32 executing program 3: r0 = socket(0x2e, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8810}, 0x20000000) keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:32 executing program 2: request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0) 22:18:32 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700)='I', 0x1) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x5b, r1) 22:18:32 executing program 3: socket(0x2e, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) 22:18:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:32 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:18:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) keyctl$negate(0xd, r0, 0x5b, 0x0) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5629dd76da5dc0a63e7b969075d207fca7434df9b9e19311416d94281a14ead00ebe1352ef87e08910900cfb92c7e3b1871205f2f6f92257b0494c7a90e6b4d3ebdbf227d196ea40237e1a8fe3977e129b9d4da4458966bde6ed02cb571", 0xbb) 22:18:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) 22:18:32 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x5b, 0x0) 22:18:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:32 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') keyctl$negate(0xd, 0x0, 0x5b, 0x0) 22:18:32 executing program 2: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:32 executing program 4: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x545a00, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000440)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x4200, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0x0) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') 22:18:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x10001, 0x80) syz_open_dev$vim2m(&(0x7f0000000280)='/dev/video#\x00', 0x13f, 0x2) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x8000) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f00000002c0)=0x8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) r4 = socket(0x28, 0x4, 0x8) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f00000003c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x30, 0x3, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4814}, 0x1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9d}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x800}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x100000001}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x1) 22:18:32 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) keyctl$negate(0xd, 0x0, 0x5b, 0x0) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0xd00, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x13}, 0x40) 22:18:32 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) keyctl$negate(0xd, r0, 0x5b, r1) 22:18:32 executing program 2: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x1, 0xb8ba, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0xfffffffffffffffd) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0xaa}, [@ldst={0x1, 0x1, 0x0, 0x4, 0xb, 0x18, 0xffffffffffffffe4}, @generic={0x3, 0x2, 0x4, 0x5}, @ldst={0x1, 0x3, 0x1, 0x7, 0x0, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='tlb_flush\x00', r1}, 0x10) keyctl$update(0x2, r0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') socket$l2tp6(0xa, 0x2, 0x73) r2 = add_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="5a5ac2819552df34bd7742f37f25ff9abb60c3d664e07737353e4a4f3f0fd7db2fc73c95d244d275934bfef792d6e25ed4141ad774b5", 0x36, 0xfffffffffffffff9) keyctl$update(0x2, r2, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x545a00, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000440)) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x4200, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = socket(0x2e, 0x800, 0xc50) bind$can_raw(r5, &(0x7f00000004c0), 0x10) 22:18:32 executing program 5: keyctl$negate(0xd, 0x0, 0x5b, 0x0) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x13}, 0x40) 22:18:32 executing program 1: prctl$PR_SET_NAME(0xf, 0x0) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x13}, 0x40) 22:18:32 executing program 5: keyctl$negate(0xd, 0x0, 0x0, 0x0) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r1) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:32 executing program 2: prctl$PR_SET_NAME(0xf, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x74}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) 22:18:32 executing program 1: prctl$PR_SET_NAME(0xf, 0x0) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 22:18:32 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700)="49e5cb865d14b3b7193d3c3be3a66a04c9bddaa4b5a37887c0ff840ff5e316307c2ce57f098433434bcd5cf98fabc31edd5735731e12af5092fce7ca1d37a73ca66ca8645080b77eebda72715f291b1f7d1a6c436173917a7db97013bec5", 0x5e) 22:18:32 executing program 1: prctl$PR_SET_NAME(0xf, 0x0) 22:18:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:32 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700)='I', 0x1) 22:18:32 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:32 executing program 4: socket(0x15, 0x8080a, 0x2) 22:18:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:32 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:18:32 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:33 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'\b r\xf9\x90Qb\x05\xd6\r.\x00\x00\x00\xb5\xb7\xc8\xca\xe3\xc9,\xe43\xc2\xff\xd4\xb4\xec\xfdf\x1a\xaf|\xf9\xa1\xfaK\x93\x88x\x8c\x11\xac\x8a\x91\xad\r\xfe\x9c\x10\x00\xca\x13r\b\xf2\xaa/$\x8a\'vN\xe6%-\xd29\xf7x\xc5\n\xf1G\x8f\f\xd9$7,\r;SD\v&\x92c\xe2\x06\x82HF\xb7\xe6*<\x86`\xab\x148q\xa7z\xcf\x0f\x9e\x98&\xe307\xd3\x8a\x95:\x11\x81]?\xf4\x87\x1c\xa2\x91\x9f?\xf2\xe7\xb9\xa1\xfbX\xcf(n\xea\x84Ss\x1b\x05\xbc\xc5\xf6tP`\xcf\x9e\xea\xba\x8c\v\xd0\x108\xe0') 22:18:33 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:33 executing program 4: socket(0x0, 0x8080a, 0x2) 22:18:33 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 22:18:33 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) 22:18:33 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:33 executing program 4: socket(0x0, 0x8080a, 0x2) 22:18:33 executing program 1: select(0x40, &(0x7f0000000000)={0xffffffff, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xb2cc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x9, 0x6, 0x6, 0x2}, {0x8, 0xc7, 0x7, 0x9}, {0x40, 0x4, 0x2, 0x6}, {0x80, 0xfc, 0x7, 0x2}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000700), 0x0) 22:18:33 executing program 4: socket(0x0, 0x8080a, 0x2) 22:18:33 executing program 1: select(0x40, &(0x7f0000000000)={0xffffffff, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 3: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x9, 0x6, 0x6, 0x2}, {0x8, 0xc7, 0x7, 0x9}, {0x40, 0x4, 0x2, 0x6}, {0x80, 0xfc, 0x7, 0x2}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x9, 0x6, 0x6, 0x2}, {0x8, 0xc7, 0x7, 0x9}, {0x40, 0x4, 0x2, 0x6}, {0x80, 0xfc, 0x7, 0x2}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 1: select(0x40, &(0x7f0000000000)={0xffffffff, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 4: socket(0x15, 0x0, 0x2) 22:18:33 executing program 3: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x9, 0x6, 0x6, 0x2}, {0x8, 0xc7, 0x7, 0x9}, {0x40, 0x4, 0x2, 0x6}, {0x80, 0xfc, 0x7, 0x2}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000280)={0x4, &(0x7f0000000180)=[{0x9, 0x6, 0x6, 0x2}, {0x8, 0xc7, 0x7, 0x9}, {0x40, 0x4, 0x2, 0x6}, {0x80, 0xfc, 0x7, 0x2}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 1: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000140)) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) 22:18:33 executing program 4: socket(0x15, 0x0, 0x0) 22:18:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 3: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='}^:+\x00', 0x0) keyctl$reject(0x13, 0x0, 0x857d, 0x9, 0xfffffffffffffff8) 22:18:33 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 22:18:33 executing program 1: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:33 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:33 executing program 1: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:33 executing program 3: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='}^:+\x00', 0x0) keyctl$reject(0x13, 0x0, 0x857d, 0x9, 0xfffffffffffffff8) 22:18:33 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:33 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 3: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 22:18:33 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:33 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:33 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:33 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 22:18:33 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 22:18:34 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) 22:18:34 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x54f, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) 22:18:34 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) 22:18:34 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x7, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: getpeername$l2tp(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4e35, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: getpeername$l2tp(0xffffffffffffffff, 0x0, 0x0) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x410100, 0x0) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: prctl$PR_SET_NAME(0xf, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:18:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:18:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:34 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:34 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x8001) 22:18:35 executing program 4: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x8001) 22:18:35 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 4: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0x0, 0x8001) 22:18:35 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:35 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:35 executing program 4: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:35 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:35 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:36 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x0, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 5: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:36 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x0, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x0, 0x7, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:36 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:36 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) 22:18:37 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) 22:18:37 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:37 executing program 5: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x5, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8001) 22:18:37 executing program 5: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) 22:18:37 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 22:18:37 executing program 5: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:38 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x1, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 22:18:38 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 22:18:38 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) 22:18:38 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x1, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:38 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x410100, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x127501, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x141980, 0x0) 22:18:38 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:39 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x5) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:39 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:39 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x5) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:39 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 3 (fault-call:0 fault-nth:0): select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:39 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x5) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:40 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:40 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x8, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 3: socket$kcm(0x29, 0x5, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 2 (fault-call:0 fault-nth:0): select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:40 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:40 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x58c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000380)={0x800, [{}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "ab3fee20f327e0"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000065c80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "5f87feed99ff34"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x34, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4880) 22:18:40 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:40 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:40 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:40 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000300)=']\x00') ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:40 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 22:18:40 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) [ 370.323015] FAULT_INJECTION: forcing a failure. [ 370.323015] name fail_futex, interval 1, probability 0, space 0, times 1 [ 370.334675] CPU: 0 PID: 7849 Comm: syz-executor.2 Not tainted 4.14.198-syzkaller #0 [ 370.342464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.351835] Call Trace: [ 370.354520] dump_stack+0x1b2/0x283 [ 370.358196] should_fail.cold+0x10a/0x154 [ 370.362341] ? schedule+0x97/0x1b0 [ 370.365927] get_futex_key+0x82a/0x1160 [ 370.369898] ? futex_lock_pi_atomic+0x2e0/0x2e0 [ 370.374558] futex_wake+0xc6/0x3c0 [ 370.378098] ? get_futex_key+0x1160/0x1160 [ 370.382336] do_futex+0x287/0x1930 [ 370.385971] ? __lock_acquire+0x5fc/0x3f20 [ 370.390237] ? futex_exit_release+0x220/0x220 [ 370.394732] ? lock_acquire+0x170/0x3f0 [ 370.398705] ? futex_exit_release+0x26/0x220 [ 370.403117] ? trace_hardirqs_on+0x10/0x10 [ 370.407351] ? futex_exit_release+0x26/0x220 [ 370.411814] ? __mutex_lock+0x360/0x1310 [ 370.415974] ? __delayacct_add_tsk+0x4b1/0x5b0 [ 370.420638] ? __might_fault+0x104/0x1b0 [ 370.424766] ? exit_mm_release+0x16/0x30 [ 370.428831] ? lock_downgrade+0x740/0x740 [ 370.432977] SyS_futex+0x1da/0x290 [ 370.436520] ? lock_acquire+0x170/0x3f0 [ 370.440482] ? do_futex+0x1930/0x1930 [ 370.444302] mm_release+0x250/0x2d0 [ 370.447925] do_exit+0x56f/0x27f0 [ 370.451390] ? trace_hardirqs_on_caller+0x571/0x580 [ 370.456482] ? _parse_integer+0xe4/0x130 [ 370.460542] ? mm_update_next_owner+0x5b0/0x5b0 [ 370.465426] ? get_signal+0x323/0x1ca0 [ 370.469304] ? lock_acquire+0x170/0x3f0 [ 370.473259] ? lock_downgrade+0x740/0x740 [ 370.477403] do_group_exit+0x100/0x2e0 [ 370.481280] get_signal+0x38d/0x1ca0 [ 370.485040] ? core_sys_select+0x251/0x6a0 [ 370.489258] ? poll_select_set_timeout+0x120/0x120 [ 370.494224] ? get_pid_task+0xb8/0x130 [ 370.498114] do_signal+0x7c/0x1550 [ 370.501688] ? fsnotify+0x8c5/0x1140 [ 370.505424] ? __vfs_write+0xec/0x630 [ 370.509237] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 370.514151] ? SyS_write+0x1b7/0x210 [ 370.517877] ? setup_sigcontext+0x820/0x820 [ 370.522195] ? lock_downgrade+0x740/0x740 [ 370.526334] ? vfs_write+0x35d/0x4d0 [ 370.530025] ? poll_select_copy_remaining+0x206/0x2e0 [ 370.535198] ? __mutex_unlock_slowpath+0x75/0x770 [ 370.540022] ? wait_for_completion_io+0x10/0x10 [ 370.544672] ? SyS_select+0x11e/0x170 [ 370.548454] ? exit_to_usermode_loop+0x41/0x200 [ 370.553104] exit_to_usermode_loop+0x160/0x200 [ 370.557671] do_syscall_64+0x4a3/0x640 [ 370.561552] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 370.569266] RIP: 0033:0x45de29 22:18:41 executing program 2: r0 = socket(0xa, 0x800, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8c0}, 0x40000) select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:41 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:41 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:41 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x1, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:41 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x1ffc, 0x0, 0x0, 0x8001}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:41 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 370.572451] RSP: 002b:00007f13f754fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 370.580149] RAX: fffffffffffffdfe RBX: 0000000000027a00 RCX: 000000000045de29 [ 370.587415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 370.594689] RBP: 00007f13f754fca0 R08: 0000000000000000 R09: 0000000000000000 [ 370.601956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 370.609219] R13: 00007ffdfc15cfef R14: 00007f13f75509c0 R15: 000000000118bf2c 22:18:41 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:41 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 22:18:41 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:41 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:41 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:41 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000100)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000140)={0x0, 0x9, 0x4, 0x20, 0x8, {0x77359400}, {0x6, 0x6, 0xec, 0x81, 0x4, 0x81, "5fc72d7c"}, 0x3, 0x2, @fd, 0xfffff3bd}) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c02ed00", @ANYRES16=0x0, @ANYBLOB="340c28bd7000fcdbdf250100000008000b000000000006001d00000000000500210001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x800) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, r3, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r4, 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000001c0)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x1f, 0x8, 0x1199121, 0x401, 0x80, 0x20000001, 0x2}}, 0x50) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x80, 0x0, 0x4, 0x100000, 0x8003, {0x0, 0xea60}, {0x7, 0x2, 0x1, 0xe1, 0x8, 0x4, "084cf64b"}, 0x400, 0x2, @userptr=0x4355, 0x6}) setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) 22:18:42 executing program 2: select(0xfffffebd, 0x0, 0x0, 0x0, 0x0) 22:18:42 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x5) 22:18:42 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:42 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 22:18:42 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:42 executing program 3: getrusage(0x0, &(0x7f0000000000)) 22:18:42 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:42 executing program 2: select(0x10, 0x0, 0x0, 0x0, 0x0) 22:18:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:42 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:42 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) 22:18:42 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:42 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:42 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) socket$can_raw(0x1d, 0x3, 0x1) 22:18:43 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:18:43 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x5) 22:18:43 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:43 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0xfffffffffffffffe, 0x0, {0x6, 0xf36d, 0x0, {0x0, 0x4, 0x3, 0x680, 0x9, 0x0, 0x7, 0x7, 0xff, 0x8000, 0x800, 0xee00, 0xee00, 0x3d, 0x9}}}, 0x78) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) 22:18:43 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 22:18:43 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0xfffffffffffffffe, 0x5209, 0x9, 0xd541, 0x3, 0x0, 0xff, 0x5}, &(0x7f0000000040)={0x0, 0x5, 0x85c, 0x1, 0x0, 0x10001, 0x101, 0x8}, &(0x7f0000000080)={0xae2, 0x8, 0x2cd0, 0x3b, 0x7fffffff, 0x7fffffff, 0x0, 0xc0}, &(0x7f0000000100)={r0, r1/1000+60000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000180)) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3ff, 0x400) 22:18:43 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:43 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x0) 22:18:43 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) 22:18:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:43 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x40000100000002, 0x0, 0x80000000000}, &(0x7f00000000c0)={0x0, 0x2710}) socket$kcm(0x29, 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000013c0)={&(0x7f0000001100)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001180)=""/110, 0x6e}, {&(0x7f0000001200)=""/163, 0xa3}, {&(0x7f00000012c0)=""/121, 0x79}], 0x3, &(0x7f0000001380)=""/6, 0x6}, 0x2) r1 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffa, 0xfffffffffffffff8, 0x1) 22:18:43 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080), 0x0) 22:18:43 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) 22:18:43 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x3ff}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:43 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080), 0x0) 22:18:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:43 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) clock_gettime(0x1, &(0x7f0000000280)) 22:18:44 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000280)) 22:18:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:44 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000002340)={0x78, 0xfffffffffffffff5, r1, {0x0, 0xae05, 0x0, {0x1, 0x2, 0x3, 0x7ff, 0x400, 0x7, 0x4000000, 0x3ff, 0x2, 0x4000, 0x479201cd, 0x0, 0xffffffffffffffff, 0xfffffc00, 0x7fffffff}}}, 0x78) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000280)) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, 0x0, 0x0) 22:18:44 executing program 1: select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000040)={0x8}, &(0x7f0000000080), 0x0) 22:18:44 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) clock_gettime(0x1, &(0x7f0000000280)) 22:18:44 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r4, 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r5, 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r6, 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r9, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="04002bbd7000fcdbdf25020000000c0002001f000000000000000c000800ff070000000000001400078008000100", @ANYRES32, @ANYRESOCT, @ANYRESOCT=0x0, @ANYBLOB="4c00078008000100", @ANYRES16=r2, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="52d19f71753937c3b8c7951bd419ed779129a9dc42a4e4e6a3497fb9205964053b4970c137509b91d28ca990c702d815268cb4325d12dbf389e4576c4d37c8f04416ddafb4e16695f0ff9fe31724", @ANYRES32=r2, @ANYBLOB="0c000300e01e0000000000001c00078008000100", @ANYRES32, @ANYBLOB="0800080042fa21af761b4a6173c5e67298f5d494aa95df488554394f06bd89f2144311864469575c472ac88f11c48d60c156d5e823557ca45b1d25e305c66359eb2e586fd626d0a540149baee52838311cae5ca256ddeb489b0dfdc9c52f3ae8d08bab172a82e92cebb49ee1104285ba2131a4ab9466389a0096b8ce2ff007289ab91aca102f8bd45ee0cd154b18a101e8b8b830c7a6f9eecfad43f1c2376f5c2492599cf42fdeb2bc89733cd8b606d542d3b36d3b786d59e05de3bc5dd8f65ea9f5f71374e30b2ecf342358ca", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4d00178008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="00df65000000000000000000", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYRESHEX=r6, @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="1400078008000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32, @ANYRES16], 0x104}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 22:18:44 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) clock_gettime(0x1, &(0x7f0000000280)) 22:18:44 executing program 1: select(0xfffffebd, 0x0, 0x0, 0x0, 0x0) 22:18:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:44 executing program 5: r0 = socket(0xa, 0x800, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8c0}, 0x40000) select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:44 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r3, 0x0, 0x0, 0x1}}, 0x20) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x12a00, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r4, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}, {0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xe081}, 0x40000) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r3, 0x0, 0x1, 0x4}}, 0x20) keyctl$unlink(0x9, 0x0, r0) 22:18:44 executing program 1: select(0xfffffebd, 0x0, 0x0, 0x0, 0x0) 22:18:44 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x80, &(0x7f0000000000)=""/254, &(0x7f0000000100)=0xfe) 22:18:44 executing program 1: select(0xfffffebd, 0x0, 0x0, 0x0, 0x0) 22:18:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:44 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fe, 0x161000) clock_gettime(0x1, &(0x7f0000000280)) 22:18:44 executing program 3: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), 0x4) 22:18:45 executing program 5: r0 = socket(0xa, 0x800, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8c0}, 0x40000) select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:45 executing program 0: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:45 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x1, &(0x7f0000000280)) 22:18:45 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x40000000000003, 0xfffffffffffffffc, 0x0, 0x100000000000000}, &(0x7f00000000c0)={r0, r1/1000+60000}) 22:18:45 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="640200000a06010300000000000000000c00000a0800094000000000880008801800078014001700626f6e643000000000000000000000001c0007801800018014000240fe8800000000000000000000000001010c00078008001c40000000070c0007800500030006000000100007800c00194000000300000000001c0007801800018014000240fe8000000000000000000000000000260c000780080008400000000570000880100007800900130073797a32000000000c00078006001d40007f00000c000780060005404e2300000c00078008000640fffffffb0c00078008000940000003ff100007800a001103000000aaaa110000100007800c001940fffffffffffff0010c00078005001a00000000000c00078005001500060000003c000780060004404e2300001800028014000240ff010000000000000000000000000001080008400000000308000b400000ffff05001500fc000000050001000700000008000940800000000500010007000000440008801c0007801800018014000240200100000000000000000000000000020c00078008000640000000bb0c00078005001a00000000000c00078007001a007d23000090000880100007800900120073797a31000000001c0007801800168014000240ff0200000000000000000000000000010c00078008000640000007ff100007800c00028008000140ffffffff180007801400170067656e657665300000000000000000000c00078006001d4007ff0000100007800c0019400000000000000100100007800a001100ffffffffffff0000080009400000083608000940000000400c00078008001c4000000000"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000280)) 22:18:45 executing program 0: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:45 executing program 0: sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:45 executing program 2: getresuid(&(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x800, @mcast1, 0x3}, {0xa, 0x4e24, 0x0, @mcast1, 0x81b}, r0, 0x7fff}}, 0x48) select(0xffffffffffffff0b, 0x0, 0x0, 0x0, 0x0) 22:18:45 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private0, 0x6}}}, 0x30) clock_gettime(0x1, &(0x7f0000000280)) 22:18:45 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:45 executing program 5: r0 = socket(0xa, 0x800, 0x8) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8c0}, 0x40000) select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:45 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000280)) 22:18:45 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000000c0)={0x0, 0x2710}) clock_gettime(0x1, &(0x7f0000000280)) 22:18:45 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:46 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x9, 0x2}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) 22:18:46 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 22:18:46 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:46 executing program 4: clock_gettime(0x1, &(0x7f0000000280)) 22:18:46 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x8, 0x2000}, &(0x7f0000000000)) 22:18:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x850) 22:18:46 executing program 4: clock_gettime(0x0, &(0x7f0000000280)) 22:18:46 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0xe, 0x6, 0x401, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r2, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x60, 0xe, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x8c0}, 0x40028) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x2, 0x8, 0x0, 0x0, 0x0, {0x9, 0x0, 0x3}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_SCTP_HEARTBEAT_SENT={0x8, 0x8, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x101}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffb}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x88}, 0x1, 0x0, 0x0, 0xfa6c07ec171f5114}, 0x800) 22:18:46 executing program 5: socket(0xa, 0x800, 0x8) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:46 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000280)) 22:18:46 executing program 4: clock_gettime(0x0, &(0x7f0000000280)) 22:18:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x850) 22:18:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4000, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x3, 0x40, 0x0, 0x1cf}]}) select(0x0, 0x0, 0x0, &(0x7f0000000000)={0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:46 executing program 2: select(0xfffffffffffffcba, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 22:18:46 executing program 4: clock_gettime(0x0, &(0x7f0000000280)) 22:18:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, 0x0, 0x850) 22:18:46 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) write$ppp(r0, &(0x7f0000000100)="72fa490a72529afe1de8eab656baa82dcc1ec952ffb1bbf469a5ed079f6fa4e6eb68c8d9cd54a21b889896b5e13e09a22bf165e2f0ff583849fb3dfb38d7baa8a90c67e1496acf0405714d38351643eda100f140ea56f3415d379349b2e52b26cf69b6347166fbffd393cc8bdf2afc13d3f44ebf94eb70237cc6564b8db36ec140e20fb10942ffc0d17fb6961a305e3de3c988728dd78b9191d99070686393e1bf1aa9ec2a5689", 0xa7) 22:18:47 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="040e473cb8e2be9c5643c9c3de410ffe6484f3d197e1e93cd9075ffaae8faa26de3207e0c9d143cb77c6e17e682c0f609fe30c124613c443b024e5773e3267b85d46da61d673c37a343e1c1b734e1b3db3a1a96293e315c1750b54ee2fa856511cd6038c23f37441502bedfeca9a061744b23f81db972ebbe60da651590ea00ab5ca7afb2f443b79426a89d5b123278a3597b26f7791061e11bd2b96988a4a113fda55059fa3406ecf1864157a2c2272ad022a9054", 0xb5, 0xfffffffffffffff8) 22:18:47 executing program 4: clock_gettime(0x1, 0x0) 22:18:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:47 executing program 5: socket(0xa, 0x800, 0x8) select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:47 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @rc={0x1f, @any, 0xb0}, @qipcrtr={0x2a, 0x3, 0x4000}, @ipx={0x4, 0x101, 0x20, "107cd97af804", 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller1\x00', 0x6, 0x3, 0x6}) 22:18:47 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:47 executing program 4: clock_gettime(0x1, 0x0) 22:18:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:47 executing program 4: clock_gettime(0x1, 0x0) 22:18:47 executing program 3: ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)=0x8) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:47 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x2c, 0xa, 0x6) 22:18:47 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x8, 0x2000}, &(0x7f0000000000)) 22:18:47 executing program 3: clock_gettime(0x0, &(0x7f0000000040)) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, 0x6, 0x0, 0x2, 0x2000000000000, 0x9}, &(0x7f00000000c0)={0x77359400}) keyctl$search(0xa, 0x0, &(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x2}, 0xfffffffffffffffe) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x0, 0x8, 0x1}) 22:18:48 executing program 5: select(0x3e, 0x0, 0x0, 0x0, 0x0) 22:18:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:48 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:48 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x8, 0x2000}, &(0x7f0000000000)) 22:18:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:48 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x8, 0x2000}, &(0x7f0000000000)) 22:18:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:48 executing program 4: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 22:18:48 executing program 2: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0xfffffffffffffffd, 0x20048005) select(0xfffffffffffffe40, 0x0, 0x0, 0x0, 0x0) 22:18:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:48 executing program 4: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:49 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) select(0x40, &(0x7f0000000000)={0xf75, 0xfffef7fffffffff8, 0x9, 0x0, 0x7c5c, 0x4, 0x100000001, 0x4}, &(0x7f0000000400)={0x66, 0x2, 0x44, 0x4, 0x9, 0x100000001, 0x1, 0x1}, &(0x7f0000000080)={0x0, 0xb, 0x3, 0x6, 0x10000000b50f, 0x100000001, 0x711, 0xa1c}, &(0x7f0000000040)) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f00000003c0)={0xc029, 0x1}) r1 = getpid() r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r4, 0x0, 0x0, 0x1}}, 0x20) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000002840)={@initdev}, &(0x7f0000002880)=0x14) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r4}}, 0x18) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000003900)={0x53, 0xfffffffffffffffb, 0x145, 0x80, @scatter={0x3, 0x0, &(0x7f0000002800)=[{&(0x7f0000002680)=""/225, 0xe1}, {&(0x7f0000002780)=""/87, 0x57}, {&(0x7f00000005c0)=""/42, 0x2a}]}, &(0x7f0000003980)="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", &(0x7f00000028c0)=""/4096, 0x1, 0x20, 0x3, &(0x7f00000038c0)}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) read$FUSE(r0, &(0x7f0000000640)={0x2020}, 0x2020) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000600)={0x0, &(0x7f00000005c0)}) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) getpgid(r1) 22:18:49 executing program 3: r0 = request_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='{.]%^[&-@@\x00', 0xfffffffffffffff9) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) socket$nl_xfrm(0x10, 0x3, 0x6) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r1, 0x210, 0x70bd2b, 0x60000, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2c}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x44090) socket$l2tp6(0xa, 0x2, 0x73) 22:18:49 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="640200000a06010300000000000000000c00000a0800094000000000880008801800078014001700626f6e643000000000000000000000001c0007801800018014000240fe8800000000000000000000000001010c00078008001c40000000070c0007800500030006000000100007800c00194000000300000000001c0007801800018014000240fe8000000000000000000000000000260c000780080008400000000570000880100007800900130073797a32000000000c00078006001d40007f00000c000780060005404e2300000c00078008000640fffffffb0c00078008000940000003ff100007800a001103000000aaaa110000100007800c001940fffffffffffff0010c00078005001a00000000000c00078005001500060000003c000780060004404e2300001800028014000240ff010000000000000000000000000001080008400000000308000b400000ffff05001500fc000000050001000700000008000940800000000500010007000000440008801c0007801800018014000240200100000000000000000000000000020c00078008000640000000bb0c00078005001a00000000000c00078007001a007d23000090000880100007800900120073797a31000000001c0007801800168014000240ff0200000000000000000000000000010c00078008000640000007ff100007800c00028008000140ffffffff180007801400170067656e657665300000000000000000000c00078006001d4007ff0000100007800c0019400000000000000100100007800a001100ffffffffffff0000080009400000083608000940000000400c00078008001c4000000000"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x70bd2b, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:49 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0xfffffffffffffffd, 0x20048005) select(0xfffffffffffffe40, 0x0, 0x0, 0x0, 0x0) 22:18:49 executing program 3: select(0x49, 0x0, 0x0, &(0x7f0000000080)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x800}, &(0x7f00000000c0)={0x77359400}) socket$nl_xfrm(0x10, 0x3, 0x6) 22:18:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x0, 0x1, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:49 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0xfffffffffffffffd, 0x20048005) select(0xfffffffffffffe40, 0x0, 0x0, 0x0, 0x0) 22:18:49 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) waitid(0x1, r0, &(0x7f0000000000), 0x1, 0x0) 22:18:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:49 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0xfffffffffffffffd, 0x20048005) select(0xfffffffffffffe40, 0x0, 0x0, 0x0, 0x0) 22:18:49 executing program 4: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:50 executing program 2: select(0xfffffffffffffc97, 0x0, 0x0, 0x0, 0x0) 22:18:50 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='+#$}}&<(&&\x16@\xd6#\x00') select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:50 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:50 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0xfffffffffffffffd, 0x20048005) 22:18:50 executing program 2: select(0x59, 0x0, 0x0, 0x0, 0x0) 22:18:50 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x100000000, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:50 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) r4 = socket$inet(0x2, 0x1, 0x3ff) connect$l2tp(r4, &(0x7f0000000080)={0x2, 0x0, @broadcast, 0x4}, 0x10) 22:18:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x850) 22:18:50 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(r0, 0x3b66, 0x2) 22:18:50 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) socket$inet(0x2, 0x1, 0x3ff) 22:18:50 executing program 4: select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:50 executing program 3: select(0xffffffffffffffbe, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xff}}, 0x10) keyctl$search(0xa, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, 0xfffffffffffffffe) 22:18:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x850) 22:18:51 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0xc}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:51 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$NFT_MSG_GETGEN(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004854}, 0x8000) 22:18:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 22:18:51 executing program 2: select(0x98, 0x0, 0x0, 0x0, 0x0) 22:18:51 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x5}}, 0x21) 22:18:51 executing program 0: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0xc}, 0x10) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="640200000a06010300000000000000000c00000a0800094000000000880008801800078014001700626f6e643000000000000000000000001c0007801800018014000240fe8800000000000000000000000001010c00078008001c40000000070c0007800500030006000000100007800c00194000000300000000001c0007801800018014000240fe8000000000000000000000000000260c000780080008400000000570000880100007800900130073797a32000000000c00078006001d40007f00000c000780060005404e2300000c00078008000640fffffffb0c00078008000940000003ff100007800a001103000000aaaa110000100007800c001940fffffffffffff0010c00078005001a00000000000c00078005001500060000003c000780060004404e2300001800028014000240ff010000000000000000000000000001080008400000000308000b400000ffff05001500fc000000050001000700000008000940800000000500010007000000440008801c0007801800018014000240200100000000000000000000000000020c00078008000640000000bb0c00078005001a00000000000c00078007001a007d23000090000880100007800900120073797a31000000001c0007801800168014000240ff0200000000000000000000000000010c00078008000640000007ff100007800c00028008000140ffffffff180007801400170067656e657665300000000000000000000c00078006001d4007ff0000100007800c0019400000000000000100100007800a001100ffffffffffff0000080009400000083608000940000000400c00078008001c4000000000"], 0x264}, 0x1, 0x0, 0x0, 0x40001}, 0x0) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:51 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 22:18:51 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) 22:18:51 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) select(0x40, &(0x7f0000000000)={0x2, 0x4, 0x7ff, 0x8000, 0x80000000, 0x1, 0x1, 0x2}, &(0x7f0000000040)={0x7, 0x3, 0x2, 0x101, 0xe36, 0x8, 0x100000000, 0x7}, &(0x7f0000000100)={0x9, 0x8, 0x6, 0x0, 0x5, 0x0, 0x7, 0x3}, &(0x7f0000000140)) socket$kcm(0x29, 0x2, 0x0) 22:18:51 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 22:18:51 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:51 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000180)={0x81, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, &(0x7f00000000c0)={0x77359400}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r4, &(0x7f0000002640)={0x18, 0x0, r5}, 0x18) write$FUSE_POLL(r2, &(0x7f00000001c0)={0x18, 0x0, r5, {0x26c6}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x8, r1, 0x0, 0x0, 0x1}}, 0x20) 22:18:52 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:52 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 22:18:52 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) 22:18:52 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002340)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r0, &(0x7f0000002380)={0xfcf6, 0xfffffffffffffff5, r1, {0x8001}}, 0x18) select(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000002180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r4) r5 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r5) keyctl$search(0xa, r4, &(0x7f0000002ac0)='encrypted\x00', &(0x7f0000002b00)={'syz', 0x3}, r5) r6 = add_key(&(0x7f00000021c0)='encrypted\x00', &(0x7f0000002200)={'syz', 0x3}, &(0x7f0000002240)="1e1e4a5d505f99b8840e66ed5a26b63dbd2f153e507b6ca3874f5afd133175e9202ecbf3f2e4b197ac68aabef92a998c5bdf7f6fa09e50ff87bec3164d3463199b90d9f133638282b6bbabf8220d97c93ec61140a524af79665b7292c80915c6a3919b143e18f6295c7a2fe206bd8752e108f993a604b6b56356bd7e176a19b7cd76477aa24edf7f592e9a242c47c2600b077fcddd77493e4e8848489fed1e9a5aff73e2696c4513d94a45fc81d5b5d5a54c21d31e8db129e4df833cb8e7d7603c3d6994f93f290a0982a069a630c1033a091609231757d44b4738b9e1145e5927bcff900f6aaab88e354ed023231dad6c8c20cac0e3", 0xf6, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r6, 0x1) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r7, &(0x7f0000002100)={0x60, 0x0, r8, {{0x9, 0x81, 0x3, 0xb8d0, 0x0, 0x80000001, 0x4, 0x100}}}, 0x60) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000002440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e8, 0x310, 0x310, 0x128, 0x0, 0x240, 0x518, 0x518, 0x518, 0x518, 0x518, 0x6, &(0x7f00000023c0), {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0x0, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0x0, 0xffffff00, 0xffffffff], 'team0\x00', 'veth1_vlan\x00', {0xff}, {}, 0x8c, 0xff, 0x2, 0x11}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}, {0x5b852cb0b7b19450, 0x7f, 0x20, 0x0, 0x81, 0x418, 0x2080}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x310}}, {{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0x0, 0xffffff00, 0xffffff00, 0xffffff00], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'macsec0\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x2e, 0x5, 0x1, 0x44}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv6=@local, 0x28, 0x1c, 0x1ff}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x8, 0x80}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x6, 0x80}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x3ff, 0x1, @ipv4=@broadcast, 0x4e22}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0={0xfc, 0x0, [], 0x1}, [0xff, 0xff, 0xff000000, 0xffffffff], [0xff000000, 0xffffff00, 0xff, 0xff000000], 'veth1_virt_wifi\x00', 'wlan1\x00', {0x8f2d8adc870c07e1}, {0xff}, 0x2, 0x80, 0x0, 0x20}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x5}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x13}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x648) ioctl$EVIOCSKEYCODE_V2(r7, 0x40284504, &(0x7f0000000040)={0x5, 0xd, 0x3, 0xff, "24e527e245236f129af3343e8815c2d79c692f1778b49653d6b56c735381c3c3"}) 22:18:52 executing program 0: select(0x59, 0x0, 0x0, 0x0, 0x0) 22:18:52 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) 22:18:52 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 22:18:52 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$clear(0x7, r0) 22:18:52 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:52 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r3, 0x0, 0x0) [ 381.556769] encrypted_key: master key parameter '.Ëóòä±—¬hª¾ù*™Œ[ßo žPÿ‡¾ÃM4c›Ùñ3c‚‚¶»«ø"—É>Æ@¥$¯yf[r’È' is invalid 22:18:52 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:18:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000065c80)={0x0, [], 0x0, "5f87feed99ff34"}) r1 = socket$inet6(0xa, 0x80000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)={r1, 0x4000020}) 22:18:52 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:52 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:52 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x8000, 0x0) 22:18:53 executing program 2: select(0x52775fff558ba77c, 0x0, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r2, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x5, 0x7, "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", 0xc1, 0x3f, 0x3f, 0x7, 0x4, 0x7b, 0x80}, r2}}, 0x120) 22:18:53 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:53 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) socket$kcm(0x29, 0x7, 0x0) 22:18:53 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) keyctl$clear(0x7, r0) 22:18:53 executing program 0: select(0x59, 0x0, 0x0, 0x0, 0x0) [ 382.312905] encrypted_key: master key parameter '.Ëóòä±—¬hª¾ù*™Œ[ßo žPÿ‡¾ÃM4c›Ùñ3c‚‚¶»«ø"—É>Æ@¥$¯yf[r’È' is invalid 22:18:53 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 22:18:53 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) keyctl$unlink(0x9, r1, r2) 22:18:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e21, 0x3e1e, @ipv4={[], [], @empty}, 0x1}, {0xa, 0x4e21, 0x7ff, @mcast1, 0x4}, 0x7, [0x3, 0x9, 0x3, 0x4, 0x8001, 0x20000000, 0xc4, 0x7fff]}, 0x5c) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:53 executing program 5: request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, 0x0) 22:18:53 executing program 1: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:53 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="9413f8f381cdf7fc10cd80e6956f258ad59453f8e64ea4cae5ddb74bbaaeffe748a258c003acca7ced84f2b5165c0005f7948b67358773e5b8d7d08ca29a318757d26449e18ca20d484ce83369cd8e2b1f8b951d8d5498fb5b323f8da317465f", 0x60, 0xfffffffffffffff9) 22:18:53 executing program 3: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:18:53 executing program 2: select(0x1d20bc03cdecf38b, 0x0, 0x0, 0x0, 0x0) 22:18:53 executing program 5: request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, 0x0) 22:18:53 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x2710}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x72400, 0x0) iopl(0x0) 22:18:53 executing program 4: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) 22:18:53 executing program 0: select(0x59, 0x0, 0x0, 0x0, 0x0) 22:18:53 executing program 5: request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, 0x0) 22:18:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x253183, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1000, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r2, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x8}}, 0x10) select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:54 executing program 4: request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:54 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1fffffff}, &(0x7f00000000c0)={0x0, 0xea60}) 22:18:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:54 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:54 executing program 4: request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:54 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:54 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:54 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:54 executing program 4: request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:54 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:54 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) socket$phonet(0x23, 0x2, 0x1) 22:18:54 executing program 2: select(0xfffffda1, 0x0, 0x0, 0x0, 0x0) 22:18:54 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:54 executing program 4: request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:54 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:54 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:54 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x44100, 0x0) 22:18:54 executing program 4: request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:54 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, 0x0, 0x40010) 22:18:54 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socket$can_raw(0x1d, 0x3, 0x1) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81b}, &(0x7f00000000c0)={r0, r1/1000+10000}) keyctl$link(0x8, 0x0, 0xfffffffffffffffa) 22:18:54 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r2, &(0x7f0000002640)={0x18, 0x0, r3}, 0x18) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, r3, {0xf9b7, 0x4, 0xfffffffd, 0x6}}, 0x20) 22:18:55 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:55 executing program 4: request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:55 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, 0x0, 0x40010) 22:18:55 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:55 executing program 4: request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', 0x0) 22:18:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, 0x0, 0x40010) 22:18:55 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r1 = socket(0x9, 0x2, 0x1000) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) setresuid(0x0, 0x0, 0xee00) 22:18:55 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:55 executing program 4: request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0) 22:18:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000001800)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="040026bd7000fbdbdf250100000008001800ac1e070105000d00000000000c001000ff0300000000000008001700", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRESOCT, @ANYBLOB="0000a0707b97cd7fcf7a2883cac6537e7e7ac5b9e119e4a968d92cd770543872afff2908f946a452d4c59c561d253de38c6f1a8cb3b5ce45db00cff30de6383a5e4b6914c4532995e7a1ec5b588b5e706b3fbf6852c92fd79aa2365003008eb05842e2deef63"], 0x74}, 0x1, 0x0, 0x0, 0x4}, 0x45) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000017c0)={0x1, 0x4}) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0x8057, 0x3}) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000000c0)={0x77359400}) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000100)={0x18, 0x0, 0x0, 0x61a4}) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000200)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000002c0)=@x25, 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/70, 0x46}, {&(0x7f00000003c0)=""/146, 0x92}, {&(0x7f0000000480)=""/245, 0xf5}, {&(0x7f0000000580)=""/247, 0xf7}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x5, &(0x7f0000001700)=""/189, 0xbd}, 0x0) 22:18:55 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f00000045c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="fb5b26573bf845920d21d088e7beef06ec841e9d624bf16ee6fdd4b23c8f9eed37800240a3763ad2eda0d22fed9205d492bd73af3aa7769ce0216e5e2a75373c9439a2f36a5678f93eb55c83c8f6ffbe5f0c5092716ce074d8f9595c7a7bd4e3401df491943fea92fa6cde96c079f30e263d9a42de36395e19d54ec039838b2754a8e189595eda23ac4a3efb673d860eb800f85907065e53b6272132bb2cc8b06f8e", 0xa2, r0) socket$inet_dccp(0x2, 0x6, 0x0) waitid(0x2, 0x0, &(0x7f0000000000), 0x2, &(0x7f0000000080)) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x17, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) 22:18:55 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:55 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:55 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r1 = socket(0x9, 0x2, 0x1000) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) setresuid(0x0, 0x0, 0xee00) 22:18:56 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:56 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r1 = socket(0x9, 0x2, 0x1000) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) setresuid(0x0, 0x0, 0xee00) 22:18:56 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:56 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) [ 385.372796] encrypted_key: insufficient parameters specified 22:18:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:56 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x454}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc8c1}, 0x80) 22:18:56 executing program 2: select(0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x2b, 0x1, 0x4, 0x2000, 0x0, {r0, r1/1000+10000}, {0x1, 0xc, 0x5, 0xff, 0x0, 0x71, "1cdaef7d"}, 0x0, 0x2, @offset=0x5, 0x2}) 22:18:56 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r1 = socket(0x9, 0x2, 0x1000) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r2, 0xee00) 22:18:56 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r3, 0xee00) 22:18:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:56 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:56 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000002280)={{0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0xfffffff9}, {0xa, 0x4e20, 0x1, @loopback, 0x1}, 0x8, [0x1f, 0xfffffffd, 0x4, 0x3, 0x80000001, 0x1, 0x2, 0x20]}, 0x5c) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f0000002340)={0x10, 0xfffffffffffffffe, r3}, 0x10) write$FUSE_STATFS(r0, &(0x7f0000002200)={0x60, 0xcc4860310626436c, r1, {{0x3f, 0x3, 0x7f, 0xfffffffffffffffe, 0x2, 0x101, 0x7}}}, 0x60) getrusage(0x1, &(0x7f0000000100)) 22:18:56 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) [ 386.161331] encrypted_key: insufficient parameters specified 22:18:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:56 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) socket(0x9, 0x2, 0x1000) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:56 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', 0x0, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, r0) 22:18:56 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r2 = socket(0x9, 0x2, 0x1000) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) read$FUSE(r1, &(0x7f00000001c0)={0x2020}, 0x2020) 22:18:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:57 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x6fcb71ad24dfe073, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r1, &(0x7f0000002180)={0xa0, 0xffffffffffffffda, 0x0, {{0x1, 0x2, 0x4, 0x800100000, 0x35a, 0x2, {0x5, 0x33c, 0x0, 0x5f7a420c, 0x8d6, 0x1f, 0x80000001, 0x1ff, 0x3f, 0x8000, 0x62, r2, r3, 0x6, 0x7f}}, {0x0, 0x5}}}, 0xa0) select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:57 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, r0) keyctl$clear(0x7, r0) 22:18:57 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:57 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r1 = socket(0x9, 0x2, 0x1000) bind$rds(r1, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x17, 0x2}}, 0x20) 22:18:57 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0xfff, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x800000000000}, &(0x7f0000000040)={0x0, 0x2710}) 22:18:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:57 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, r0) keyctl$clear(0x7, r0) 22:18:57 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) 22:18:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:57 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:57 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) r0 = socket(0x9, 0x2, 0x1000) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e21, @private=0xa0100fe}, 0x10) 22:18:57 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, r0) keyctl$clear(0x7, r0) 22:18:58 executing program 2: getegid() select(0x0, 0x0, 0x0, 0x0, 0x0) 22:18:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:58 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:58 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) socket(0x9, 0x2, 0x1000) 22:18:58 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, r0) 22:18:58 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, r0) 22:18:58 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', 0x0) keyctl$clear(0x7, r0) 22:18:58 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:18:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f0000001400), &(0x7f0000001440)=0x10) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2000000005, 0x6}, &(0x7f00000000c0)={0x0, 0x2710}) 22:18:58 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) socket(0x25, 0x1, 0x7) 22:18:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:58 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, 0x0) 22:18:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:59 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:18:59 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) socket(0x25, 0x1, 0x7) 22:18:59 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, 0x0) 22:18:59 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x17, 0xa, 0x201, 0x0, 0x0, {0x8, 0x0, 0x4}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x4000010) select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x200, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x805}, 0x64048004) 22:18:59 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x40000, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x2}, &(0x7f00000000c0)={0x77359400}) 22:18:59 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:18:59 executing program 5: r0 = add_key$keyring(&(0x7f0000004580)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='/dev/ion\x00', r0) keyctl$clear(0x7, 0x0) 22:18:59 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket(0x25, 0x1, 0x7) 22:18:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x80, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:59 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:59 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) socket(0x25, 0x1, 0x7) 22:18:59 executing program 4: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x400000000000004, 0x100000000}, &(0x7f00000000c0)={0x0, 0x2710}) socket(0x25, 0x1, 0x7) 22:18:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x78, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:18:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:18:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:19:00 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f0000001400), &(0x7f0000001440)=0x10) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2000000005, 0x6}, &(0x7f00000000c0)={0x0, 0x2710}) 22:19:00 executing program 4: socket(0x25, 0x1, 0x7) 22:19:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:00 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0xffffffffffffffda}, 0x10) select(0x0, 0x0, 0x0, 0x0, 0x0) 22:19:00 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:19:00 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) select(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000600)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000680)={0x5, 0x10, 0xfa00, {&(0x7f0000000400), r1, 0x3}}, 0x18) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) select(0x40, &(0x7f0000000040)={0x7ff, 0x100000000, 0xeae, 0x7, 0x5, 0x3, 0x6, 0x4}, &(0x7f0000000080)={0x80, 0xfff, 0x6, 0x3ff, 0x81, 0x1, 0x100, 0x1}, &(0x7f0000000300)={0x8, 0x5, 0xb0, 0x2, 0x7, 0x4, 0x6, 0x8000}, &(0x7f0000000380)={r2, r3/1000+60000}) 22:19:00 executing program 4: socket(0x0, 0x1, 0x7) 22:19:00 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f0000001400), &(0x7f0000001440)=0x10) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2000000005, 0x6}, &(0x7f00000000c0)={0x0, 0x2710}) 22:19:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:00 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x8440, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:19:00 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f0000001400), &(0x7f0000001440)=0x10) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0x2000000005, 0x6}, &(0x7f00000000c0)={0x0, 0x2710}) 22:19:00 executing program 3: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x40, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xa3b}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfa}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe6}]}, 0x40}, 0x1, 0x0, 0x0, 0xc008000}, 0x4000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000600)={0x2020, 0x0, 0x0}, 0x2020) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r5, 0x300, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4048004) write$FUSE_GETXATTR(r2, &(0x7f0000002640)={0x18, 0x0, r3}, 0x18) write$FUSE_BMAP(r0, &(0x7f00000001c0)={0x18, 0x0, r3, {0x100000001}}, 0x18) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:19:00 executing program 4: socket(0x0, 0x1, 0x7) 22:19:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:00 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 2: select(0xffffffffffffff32, 0x0, 0x0, 0x0, 0x0) 22:19:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r1, 0xee00) 22:19:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:01 executing program 4: socket(0x0, 0x1, 0x7) 22:19:01 executing program 5: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(r1, 0x7c80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x80000000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x6, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x200, 0x1, &(0x7f0000000100)=""/1, 0x40f00, 0x9, [], 0x0, 0x1e, r0, 0x8, &(0x7f0000000140)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x10, 0x1f, 0x2}, 0x10}, 0x78) 22:19:01 executing program 5: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 4: socket(0x25, 0x0, 0x7) 22:19:01 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:19:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x40, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:01 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0)={0x0, 0x2710}) 22:19:01 executing program 2: select(0xffffffffffffffdd, 0x0, 0x0, 0x0, 0x0) 22:19:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x34, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:01 executing program 5: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 4: socket(0x25, 0x0, 0x7) 22:19:01 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:19:01 executing program 3: socket$rds(0x15, 0x5, 0x0) clock_gettime(0x3, &(0x7f0000000000)={0x0, 0x0}) select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x40000000000000, 0x0, 0x2, 0x0, 0x10000000000000, 0x800000007}, &(0x7f0000000040)={r0, r1/1000+60000}) r2 = request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='#}\xb4%\\$%$\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r2) 22:19:01 executing program 2: select(0x11, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r0, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x4000800) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) 22:19:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:01 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 4: socket(0x25, 0x0, 0x7) 22:19:01 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0x0, r0, 0xee00) 22:19:01 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) setresuid(0x0, 0x0, 0xee00) 22:19:01 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000001400), &(0x7f0000001440)=0x10) 22:19:01 executing program 4: socket(0x25, 0x1, 0x0) 22:19:01 executing program 3: select(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)={0x0, 0x2710}) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9a, 0x0, 0x2, 0x80000000}, {0x400, 0x8, 0xc4, 0x5}]}) 22:19:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) setresuid(0x0, 0x0, 0xee00) 22:19:02 executing program 2: getpgid(0xffffffffffffffff) select(0x0, 0x0, 0x0, 0x0, 0x0) 22:19:02 executing program 4: socket(0x25, 0x1, 0x0) 22:19:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:02 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, 0x0, &(0x7f0000001440)) 22:19:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r4, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x0, 0x0, [0x8, 0x7fff, 0x2, 0x7ff, 0x5, 0xeac, 0x9, 0x8000, 0x7ff, 0x1800, 0x3, 0x4, 0x0, 0x2, 0x3, 0x2]}, {0x4, 0x0, [0x3, 0x9, 0x1, 0x0, 0x9, 0x6, 0x8, 0x0, 0x0, 0x5480, 0x2, 0x0, 0x1, 0x4, 0xfc, 0x4]}, {0x2, 0x0, [0xf5, 0x0, 0x7, 0x9, 0x8000000, 0x0, 0x8, 0x2d, 0x8, 0x329, 0x0, 0x81, 0x3, 0x6, 0x2a39, 0x5]}, {0x8, 0x0, [0x1000, 0x9, 0x5, 0x8, 0x6, 0x3, 0x8, 0x7fff, 0xfffffff9, 0x8, 0x80000001, 0xfffeffff, 0x3ff, 0x9, 0x5, 0x406]}, {0x8, 0x0, [0x9, 0xde, 0x9, 0x6, 0x0, 0x80000001, 0x20, 0x0, 0x0, 0x6, 0x1, 0xffffffc1, 0xd, 0xfffffffd, 0x2, 0xfffff800]}, {0x1, 0x0, [0xa7, 0x1, 0x222, 0x100, 0x2, 0xff, 0x1, 0xf8, 0xf5, 0x71, 0xfffff21a, 0x4c8, 0x6, 0x81, 0x10000, 0x280]}, {0xe631bdeb7732ff97, 0x0, [0x1, 0x2, 0x1000, 0x1, 0x4, 0x0, 0x0, 0xc5a, 0x6, 0x7fffffff, 0x3, 0x8bc, 0x8d0, 0xffff, 0xffff, 0xf38]}, {0x11, 0x0, [0x80000001, 0x7fff, 0x3, 0x101, 0x10000, 0x6, 0x2a8, 0x2, 0x3, 0x5, 0x7e2f, 0x2, 0x7f, 0x5, 0x438, 0x8]}], r4, 0x1, 0x1, 0x240}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100), r1, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0x3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e22, @loopback}}}, 0x118) select(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x2710}) 22:19:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) setresuid(0x0, 0x0, 0xee00) 22:19:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:02 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, 0x0, &(0x7f0000001440)) 22:19:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) setresuid(0x0, 0x0, 0xee00) 22:19:02 executing program 4: socket(0x25, 0x1, 0x0) 22:19:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40010) 22:19:02 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) setresuid(0x0, 0x0, 0xee00) 22:19:03 executing program 2: select(0x905fb608d77ddaf, 0x0, 0x0, 0x0, 0x0) 22:19:03 executing program 4: socket(0x25, 0x1, 0x0) 22:19:03 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$l2tp(r0, 0x0, &(0x7f0000001440)) 22:19:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x5, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40010) [ 571.330877] INFO: task syz-executor.3:9135 blocked for more than 140 seconds. [ 571.338480] Not tainted 4.14.198-syzkaller #0 [ 571.345789] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.354390] syz-executor.3 D28912 9135 6374 0x00000004 [ 571.360033] Call Trace: [ 571.363441] __schedule+0x88b/0x1de0 [ 571.367179] ? trace_hardirqs_on+0x10/0x10 [ 571.373568] ? io_schedule_timeout+0x140/0x140 [ 571.378955] ? trace_hardirqs_on+0x10/0x10 [ 571.383992] ? lock_downgrade+0x740/0x740 [ 571.388151] schedule+0x8d/0x1b0 [ 571.392231] schedule_timeout+0x80a/0xe90 [ 571.396407] ? usleep_range+0x130/0x130 [ 571.401490] ? ucma_close+0x20b/0x340 [ 571.405340] ? wait_for_common+0x26a/0x430 [ 571.409571] ? lock_acquire+0x170/0x3f0 [ 571.415061] ? lock_downgrade+0x740/0x740 [ 571.419265] ? _raw_spin_unlock_irq+0x24/0x80 [ 571.424533] wait_for_common+0x272/0x430 [ 571.428623] ? out_of_line_wait_on_atomic_t+0x1a0/0x1a0 [ 571.434786] ? __mutex_unlock_slowpath+0x75/0x770 [ 571.439753] ? wake_up_q+0xd0/0xd0 [ 571.444135] ? locks_remove_file+0x2cd/0x420 [ 571.448556] ucma_close+0xfc/0x340 [ 571.453176] ? ima_file_free+0x4f/0x330 [ 571.457168] ? ucma_query_addr+0x320/0x320 [ 571.462216] __fput+0x25f/0x7a0 [ 571.465523] task_work_run+0x11f/0x190 [ 571.469427] exit_to_usermode_loop+0x1ad/0x200 [ 571.474980] do_syscall_64+0x4a3/0x640 [ 571.479578] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 571.486276] RIP: 0033:0x417781 [ 571.489477] RSP: 002b:00007ffcccefd970 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 571.498040] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000417781 [ 571.505978] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 0000000000000003 [ 571.513760] RBP: 0000000000000000 R08: 0000000001192808 R09: 0000000000000000 [ 571.521682] R10: 00007ffcccefda40 R11: 0000000000000293 R12: ffffffffffffffff [ 571.528977] R13: 0000000000000001 R14: 0000000000000005 R15: 000000000118bfd4 [ 571.537153] [ 571.537153] Showing all locks held in the system: [ 571.544033] 1 lock held by khungtaskd/1068: [ 571.548479] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a [ 571.557627] [ 571.559255] ============================================= [ 571.559255] [ 571.566428] NMI backtrace for cpu 1 [ 571.570059] CPU: 1 PID: 1068 Comm: khungtaskd Not tainted 4.14.198-syzkaller #0 [ 571.577509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.586855] Call Trace: [ 571.589454] dump_stack+0x1b2/0x283 [ 571.593088] nmi_cpu_backtrace.cold+0x57/0x93 [ 571.597623] ? irq_force_complete_move.cold+0x7c/0x7c [ 571.602933] nmi_trigger_cpumask_backtrace+0x13a/0x17f [ 571.608221] watchdog+0x5b9/0xb40 [ 571.611681] ? hungtask_pm_notify+0x50/0x50 [ 571.616014] kthread+0x30d/0x420 [ 571.619385] ? kthread_create_on_node+0xd0/0xd0 [ 571.624055] ret_from_fork+0x24/0x30 [ 571.628907] Sending NMI from CPU 1 to CPUs 0: [ 571.634517] NMI backtrace for cpu 0 [ 571.634523] CPU: 0 PID: 3651 Comm: systemd-journal Not tainted 4.14.198-syzkaller #0 [ 571.634528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.634531] task: ffff888094206300 task.stack: ffff888094208000 [ 571.634534] RIP: 0010:___bpf_prog_run+0xfa9/0x5a70 [ 571.634537] RSP: 0018:ffff88809420fa48 EFLAGS: 00000246 [ 571.634542] RAX: 1ffffffff0d5e71d RBX: dffffc0000000000 RCX: ffff88809420fe68 [ 571.634546] RDX: 0000000000000000 RSI: ffffc900018fa030 RDI: ffffffff86af38e8 [ 571.634559] RBP: ffff88809420fb58 R08: 0000000000000000 R09: 0000000000000000 [ 571.634563] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff86af3740 [ 571.634567] R13: 1ffff11012841f50 R14: ffffc900018fa068 R15: 0000000000000035 [ 571.634571] FS: 00007f1cda2c28c0(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 571.634574] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 571.634578] CR2: 00007f1cd7739000 CR3: 000000009493b000 CR4: 00000000001406f0 [ 571.634582] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 571.634585] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 571.634587] Call Trace: [ 571.634590] ? __lock_acquire+0x5fc/0x3f20 [ 571.634593] ? bpf_jit_compile+0x30/0x30 [ 571.634595] ? __bpf_prog_run32+0x7c/0x9c [ 571.634598] ? __bpf_prog_run64+0xb0/0xb0 [ 571.634601] ? trace_hardirqs_on+0x10/0x10 [ 571.634603] ? __lock_acquire+0x5fc/0x3f20 [ 571.634606] ? seccomp_run_filters+0xfb/0x540 [ 571.634608] ? __put_seccomp_filter+0x90/0x90 [ 571.634611] ? wait_for_completion_io+0x10/0x10 [ 571.634614] ? trace_hardirqs_on+0x10/0x10 [ 571.634616] ? trace_hardirqs_on+0x10/0x10 [ 571.634619] ? ep_scan_ready_list+0x560/0x7e0 [ 571.634622] ? __seccomp_filter+0x7e/0xd60 [ 571.634624] ? seccomp_send_sigsys+0x180/0x180 [ 571.634627] ? __might_fault+0x104/0x1b0 [ 571.634629] ? lock_acquire+0x170/0x3f0 [ 571.634632] ? lock_downgrade+0x740/0x740 [ 571.634635] ? __secure_computing+0xdd/0x3e0 [ 571.634637] ? syscall_trace_enter+0x359/0xc20 [ 571.634640] ? ns_to_timespec+0x64/0x90 [ 571.634643] ? syscall_slow_exit_work+0x560/0x560 [ 571.634645] ? do_syscall_64+0x4c/0x640 [ 571.634648] ? do_syscall_64+0x41b/0x640 [ 571.634651] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 571.634652] Code: 46 01 45 0f b6 3f 83 e0 0f 48 8d 44 c5 00 48 89 c2 48 c1 ea 03 80 3c 1a 00 0f 85 c7 39 00 00 4c 89 38 49 83 c6 08 e9 ce f0 ff ff 42 c4 f6 ff 49 8d 7e 01 48 89 f8 48 89 fa 48 c1 e8 03 83 e2 [ 571.635042] Kernel panic - not syncing: hung_task: blocked tasks [ 571.876800] CPU: 1 PID: 1068 Comm: khungtaskd Not tainted 4.14.198-syzkaller #0 [ 571.884256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.893602] Call Trace: [ 571.896200] dump_stack+0x1b2/0x283 [ 571.899830] panic+0x1f9/0x42d [ 571.903026] ? add_taint.cold+0x16/0x16 [ 571.907059] ? printk_safe_flush+0xa9/0x110 [ 571.911388] watchdog+0x5ca/0xb40 [ 571.914850] ? hungtask_pm_notify+0x50/0x50 [ 571.919192] kthread+0x30d/0x420 [ 571.922580] ? kthread_create_on_node+0xd0/0xd0 [ 571.927274] ret_from_fork+0x24/0x30 [ 571.932376] Kernel Offset: disabled [ 571.936033] Rebooting in 86400 seconds..