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", 0x1000, r4) add_key$user(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="ccbcc133087090e5c521163c2f78c0322be7a167190f6456637928745d091414fef68c2d6df31a2519690cbb5aed2b6eef62e066b869b4b0c423afb2c03eff3bfef10beb4d880d70fe257f564e8508ab824819be16165224d38d1ae5aa4eecc625eb4886ae3187f666736f68838e73cba482ec220bf03aa9ccc8a00192ccece8a7b540232b6fb6e280d920644100a54872aae9a8ec19a43261aad0191e6f1c749be40356d1b38ee181d9e3acf3499559af5e7f07785b7b5b2d54a4af7541e034", 0xc0, r2) 14:39:52 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:52 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x2c010000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:52 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1033.993134][T21013] trusted_key: encrypted_key: insufficient parameters specified [ 1034.035755][T21012] trusted_key: encrypted_key: insufficient parameters specified [ 1034.101393][T21013] trusted_key: encrypted_key: insufficient parameters specified [ 1034.176170][T21022] trusted_key: encrypted_key: insufficient parameters specified 14:39:53 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x1, 0x1}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x9, 0x0, 0x6], 0x3, 0x800, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 14:39:53 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) sendmsg$tipc(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x1, {0x40, 0x1}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000100)="e3f9bf01b16062a4d8050142ee0167759f1b4daa04f179", 0x17}, {&(0x7f0000000140)="fdb24e5eaca07117a0131a9bdd6fdc97803f5f982093b84951451454a84b46357c55a74f05feb11ce2292ebc6c9bb973fc837571493e89fe22a7fe6db17d01760a9364075ab3c8abf4fb9555f7fae5aaf524b974b2fadd2299f8e489ab4853a35b47061cf9850e9b2eb884d753f82ccb4c63c382d35c0bbf2e3a572b95c337025db46e4fe522b84e74b178977b8ba202c064df83297d3b69ecdec7521255e10722e35237aed6a2543d5807189068659835608027792612e2757f424e8c1d72e898081cb5d571fc9d6705b7c4a98120dbdc633888cee31d62b0a0df6871", 0xdd}, {&(0x7f0000000240)="c7b76cdea53946e8031a9fe3e6039f6363951b10331b38c8c18787ea3aff64a396b2e4a8999488cb1160a9309c3687275e1fa22886b568d96a6c2deb454f98c2a82178b58dcbe4e60a5cf5a8fa70b1e43b1a860b7eb6866051545ac8b8e1045aff0bcd854e03b9ea814b6e61bf", 0x6d}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000002c0)="cc026e8d49d456a6950bc5988a003d19239c31184a85eba8480a5690de3f0c60b5b4803ef69080e65643e8f437adf98487d3e5c608d6fb7b7c", 0x39}, {&(0x7f0000000300)="1dc06e85616d953569eae8fd98697f88709d31e8b2c3b12534d98821b2015e74a2362b2a7bf01f9c09d208a566e3949e7fc28aced73ef9f8bed8b05345f31a6da84faa2813328d9190b9b03ff4662f2f", 0x50}, {&(0x7f0000000380)="b6b733adf9232b3b731956396a94759d28fc35726f802d1f125aab48fa5e9b20ec1577cc68cf444ef56fbf4fd0e46a98a4fd5dfb33c7c948cd994d899baeee7bff85de0ad5960b411c45c0fe535edc036ce2366385a1b436f5898bafcda6786355aefbb8d66a69ba6e78e6d16146d8322947c1d00006c2f4e1d3507358d2210c6be965e4eb61d6724749b685c6de323ea8f0aa71008f09c8beaaf7d0f25f3b4955f7", 0xa2}], 0x7, &(0x7f00000004c0)="b9aaa86e53d059efeaf9ceb4", 0xc, 0x4040}, 0x44004) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x2}, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:53 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:53 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x34, 0x6a, 0x4, 0x3f, 0x0, 0x100000001, 0x2880, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x40, 0xb2, 0x5, 0x1, 0x401, 0x3b, 0x5, 0x0, 0x9, 0x0, 0x72c}, 0xffffffffffffffff, 0xf, r1, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r3, 0xbb6, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x2e, 0x1, 0x0, 0x0, 0x770, 0x40180, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000000c0), 0x6}, 0x8c00, 0x1a4, 0x4, 0x1, 0x66b, 0x4, 0xd6b5, 0x0, 0x800, 0x0, 0x7}, r4, 0x4, r2, 0x7) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x3, 0x1b, 0x2, 0x0, 0x10001, 0x2200, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x1, @perf_config_ext={0x40, 0x1}, 0x10600, 0xf2c8, 0xb91, 0x5, 0x0, 0x4, 0x3ff, 0x0, 0x101, 0x0, 0x4}, r4, 0x5, r1, 0xf) 14:39:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x2000000}], 0x400000000000132, 0x4000000) 14:39:53 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:53 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), 0x4) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:53 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:54 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x3b16c800}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:54 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7, 0x66, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0xd01a}, 0x20000, 0x2, 0x10001, 0x9, 0x1ff, 0xfff, 0x80, 0x0, 0x20}, 0x0, 0xb, 0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7f, 0x3, 0x1, 0x2, 0x0, 0x80000000, 0xa90c3, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x8109, 0x2800000000000000, 0x7fff, 0xc, 0x800, 0x3f, 0x7, 0x0, 0x2, 0x0, 0x4}, r1, 0xc, r3, 0x9) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:54 executing program 3: write$hidraw(0xffffffffffffffff, &(0x7f0000000100)="3f4e15189d38ca64ba3097bbbd3cf36aa7f53122cd8d72a1f857f8c9d596f63cdc612c356ed5fc64a0df090c8cb17677d82ee993faccc8e0a2ff3fe2faeddd59ab4b7742349d90e48de7b9a87e02e736ff01fc7d4efa7360b05f11d229f0edbd28bcec0bfaaa3e3c80c8d16a6520a395d99b779d8cfe8007a5c8c9a1468f966768eb276aefa817613f95ef57fbbd911a59ef7b8752aaecc37d90213ba6b9cac1", 0xa0) keyctl$get_persistent(0x16, 0xee01, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0xa4, 0x20, 0x200, 0x5, 0x7, 0x86bc, 0x7a, 0x7}, 0x20) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r2) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:54 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:54 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x3190000}], 0x400000000000132, 0x4000000) 14:39:54 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="7eb947b5c7c61006f762819cd273082dbe0198037ff1c4a3ec1d2ed996c7f3b685f72c2f0e30ae8c256570d34b275735014b1fb7e264d69b237dfbd7fe43c3dae36006abbbb182c464a20344954cc1bc2b9abe10df5d5f283be52302d354a13d84ad106f2f006b0f91ca60f963e7fb8cdf6fc62d5235c9f1a2f720e073f1d4656fba6205e441ea5d39f349b5f1aebe3ce9874ae4d9fc90805fc0879d637c7b4ec578e67425b3ba13da4bb567f0dfc1452204fd7694f85479026943b15954b8510404b2833821a8027476", 0xca, r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r2 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='\x00', r0) add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="d6677997c829dfd1c7580d3aa63a428dc9cd78cd4801fc45f3a0829e0be6a862f31ef18b4fc3e7f532e7e9dc7d559e552e9dc484e1e3734dc441ff99ea24b523390ac1fbb165c7d34b81", 0x4a, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r3 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000100), 0x4) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000340)=0x6, 0x4) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0xc0002, 0x50) getpeername$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) keyctl$get_persistent(0x16, 0xee01, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x2, 0x5, 0x7, 0x40, r0, 0xfffffff9, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x40) ioctl$FIONCLEX(r4, 0x5450) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r5 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000100), 0x4) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000040)=0x6, 0x4) keyctl$unlink(0x16, r2, 0xfffffffffffffffb) [ 1035.882161][T21088] trusted_key: encrypted_key: insufficient parameters specified 14:39:54 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 1036.093883][T21088] trusted_key: encrypted_key: insufficient parameters specified 14:39:55 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) accept4(r1, &(0x7f0000000000)=@ax25={{}, [@default, @remote, @remote, @default, @default, @rose, @null, @null]}, &(0x7f0000000080)=0x80, 0x80400) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:55 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:55 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:55 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x3f000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:55 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r1 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000100), 0x4) sendmmsg$unix(r1, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ca8b8bdf2858fb1ac67730bcb4f407aa92503ac890e2c9b17bb6540f614fcffae5ef8ea592b5600dbbf77f95893ea0a60c9392e7dd7f373ce6011245a1056127aa376c14e9021d2212b2d889aa355a8e7897fd6813f9f6f350af6999fd55ee300093b8f4be4cdde50509e83226461ffaa963c8bc815e74a9baa887efe4178db0dd4159272e4bec0cd51a43fa5877dfe13fea047c929410f1f5358ce74617eac346ad928739e260bd25c7fbce1ead56f87bf46007b17dfd3baa08118583d2eb82616b22bbaf01aa6e57edfa1f0be27ca87148d8aaca1dc9ef7aa4b71d76c28ad2f55f06bfda9d7b73fea927c9f649", 0xee}, {&(0x7f0000000100)="656ecbb8d63a5659b5bc371f1dd79318d1e1806e42847821c5d0548ef01f168d01708c8a296dba12031a7e10cd9d2d85b5eec22be296390e4ac41210ef1433405ce544e1845be6db82e0082a590d65ef59001a55db98cc9a69f4f6831e53245bde3a834e1afee9c59c09624cad2d75f11c541e28fa6f3142b2bb4e8cbc29972a57bcf8a867bdb84d838c68bc12ca98f462d9ac3aa36b5089f7a4969b292360cfbcbf309fb7f145070b0c47c654d7871c5350e230bcb2dc19b10f57f1d61f8057ba65aec69757d29e6aa7b5d7a6e58c3fbbe791bcd9f0810e", 0xd8}, {&(0x7f0000000200)="a1174f3a1a11c95d87b4ad9136c34283d10acf19da1fe32f55709f7debe39340", 0x20}, {&(0x7f0000000240)="0b7762d593323b45a029c295c9654f843a73f00156ca74f1bb4c9241bd6b0596a6280e51f886e8bb8dc5c804782ba35027c09100842067784c3384b37f89f580b2f91fc83e7a3450e6bf9ed2e8a5cc430cc5508b2d3b8a70", 0x58}], 0x4, 0x0, 0x0, 0x80}}, {{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000380)="45750d1eb0e7be62db4a34c561f659bd575458c0c62be4e501f2acebe797c11c9d5cb60e86b9fd4fad097579afcd1916a65cb8d62b8649b72b72df52519c3d459bfc50ce973cd1a933bcd903f8e095b67d20e24f1f19bb64dc26b0028b834a0cacdf071f130fae24fba47d5cdb879dcdfbf6a08eef087868ef3182aa2a9603ab382fc72d7b7338f7a874c083ab79bd9bfbb0ec0e03df9c76c3666294b278cad9583b6e9eb80aea0e7693f86b672590b476bb48002fd3f7b3d4c8af9cc4", 0xbd}, {&(0x7f0000000440)="905687f8114ac901fa3157127abfe70f5ba74cc270993bcba1e957f3f0eaa2294214c7751100dea3dbf5a74f8fe767c83147581b71341c440476e1c9069d9f73ee9b048fed2a512fcbc2fffa38b19261ad658b9a1f2173498b490446c97b75698bf581de76b4ee0fc8982bba35aba9d20cb18ff66b6cfdded408ef50fb90d5436fb4c2a82f2ca09e93c43e7abc4692c064ee21acadd2bf20c332a69fa00143e264aa96d46b7437e45e4b58f2b547d1d6c8d5773277d007578cb95ccae068ef59dfc58e95f0", 0xc5}, {&(0x7f0000000540)="0b5b810ca2ce2c9ed55b8f97ea3aa4d7ae99bac88fb8c183efd238086254c1cc3275427c45c1cfbcb077bbc5591eb8b0a6cd6597d60fda675a5c4787bc1664b48cc44abeb08b7fb9dcdf91a209dba751b6a8c28dd6bd43b81a2ac027e153c8913c406642d6842af2d49a203fd8e79411de2195d01225b0cd18b682cb0c738ae7b8f6312e5c475a0a7885422c9d3f23d7178650c4c23c2abd04fe8c4c2c1fa593b0039537cb7cfbfe5e0ba77bfd3ef26844197e", 0xb3}, {&(0x7f0000000600)="944f9e4fbd5447", 0x7}, {&(0x7f0000000640)="694458d0b94f619ab4e6d00a79f0b5de246c371fb78e03d836710cd1936c349b6af7f70796f9bf9a36bd6a5c004f5939d60b363f8a77646e32", 0x39}, {&(0x7f00000007c0)="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", 0xfe}, {&(0x7f0000000680)="ee5f22d102c56ceb34497020c176506a", 0x10}, {&(0x7f00000008c0)="bd50522e9c6d3dee4a7841cce7bbd814a464666a193ba078b7bcd2d7f994dba7093b283db4ec07d3e93aa78ccc590117e94bd52e15d166975112ea0d9fdd5ecf6db1ee0aa90eccbc9bec90dc0144e88ab0661a114381510d13783bf746ba1981e9803fbc26c8174810a20f9b18c84bfc02391a1bdb8a5d0efae90891f702729cd80a6f630cd0093484d0e873c704b8b324fa2642820c2ee9caf2a1862e1db9f6c6cbfc6f87c76267b02679a251aef92687e44acd0a4c607bd7336559a010eec0eff3bc7b34848de97c19c277a3134bf494e07969a6c8633bd677e513fc57a23706f1e828abfa07f5afca0e374b989a65c479a5", 0xf3}], 0x8, 0x0, 0x0, 0x40800}}], 0x2, 0x20891) 14:39:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x5}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:55 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r2 = socket$can_raw(0x1d, 0x3, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000), &(0x7f0000000040)={0x0, 0xfb, 0xdc, 0x1, 0xc3, "5840aa7c19b26ca704f219de8181448a", "f74483678197eac64c6c7ec7442b176e6b3d35d350ef76192f2850b7e764138202daebb91a9a35eca829a08395b1e895b714ca7fbbf2423a0b87208908038784d5eb775bb42552da8590a56770da4c395aa8dc756fb0a4cebd7153e2eeffb620ba54fec157bea815e0b50ac5cd3e057d9eaf27e1424ed6ede1d68b4892eb2c06dcd8770f8096271af0d98163a00f4afeae63c73e0e3793d1ed9cc20157dfba6807025b16f61069be4c35903573954f7aaef67d52cce2ec66bf9256cfad0938989036184908b664"}, 0xdc, 0x1) 14:39:55 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x4000000}], 0x400000000000132, 0x4000000) 14:39:55 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x7}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:56 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) unshare(0x6c010e00) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r2) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='keyring\x00', r0) keyctl$unlink(0x9, r2, r3) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:56 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r1 = socket(0x1d, 0x80000, 0x7) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:56 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x1a6}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:56 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1037.348240][T21152] trusted_key: encrypted_key: insufficient parameters specified [ 1037.432167][T21154] trusted_key: encrypted_key: insufficient parameters specified 14:39:56 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:56 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x40000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:56 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x8, 0x1f, 0x0, 0x8, 0x0, 0xffff, 0x4000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x9, 0x8}, 0x50, 0x100000001, 0x0, 0x8, 0x2, 0x0, 0x5017, 0x0, 0xcc, 0x0, 0x101}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:56 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x300}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:56 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:56 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0xf8, 0x5, 0x1, 0x0, 0xffffffffffffffff, 0x80, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4b, 0x4, @perf_config_ext={0x63a, 0x100000001}, 0x40843, 0x100, 0x1, 0x1, 0xffffffff, 0xfffffffd, 0x401, 0x0, 0xcc, 0x0, 0x4}, 0x0, 0xb, r1, 0x4) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r3) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) 14:39:56 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x7000000}], 0x400000000000132, 0x4000000) 14:39:57 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x500}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 1038.131288][T21189] trusted_key: encrypted_key: insufficient parameters specified 14:39:57 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r1, 0xbb6, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) r3 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000100), 0x4) sendmsg$nl_route(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_newrule={0x44, 0x20, 0x800, 0x70bd2c, 0x25dfdbfc, {0xa, 0x80, 0x20, 0x3, 0x0, 0x0, 0x0, 0x6, 0x9}, [@FRA_SRC={0x14, 0x2, @mcast1}, @FRA_DST={0x14, 0x1, @private0}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x47323e87bcbc974c) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1038.228887][T21193] trusted_key: encrypted_key: insufficient parameters specified 14:39:57 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x700}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:57 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r1 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='}]%\x00', r0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='keyring\x00', r1) 14:39:57 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:57 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:57 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x80fb3c2b}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:57 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x8000000}], 0x400000000000132, 0x4000000) 14:39:57 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3f00}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:57 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:57 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:57 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40050b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x4, 0x2, 0x0, 0x4, 0x0, 0x1, 0x68848, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x420, 0x9, 0xffffffc0, 0x9, 0x5f30f490, 0x6, 0x9, 0x0, 0x81, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:57 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:58 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) finit_module(r1, &(0x7f0000000000)='\x00', 0x1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:58 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) close(r0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "ca0a8baeb347eb9609502b3ecd2ab11d56a30b3cf59a6ddd76532a34cfcd385454cd98d50e324851a9f87a1ea55ff4138dd2dd6bd79e3e706637038fcf79557d", 0x2f}, 0x48, r1) 14:39:58 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x11000000}], 0x400000000000132, 0x4000000) 14:39:58 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xa601}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:58 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1039.362286][T21260] trusted_key: encrypted_key: insufficient parameters specified [ 1039.446565][T21260] trusted_key: encrypted_key: insufficient parameters specified 14:39:58 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x9f9364eb}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:58 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x5, 0x21, 0x4, 0x0, 0x400, 0x81070, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x6, 0x8}, 0x110, 0x3, 0x6, 0x7, 0x2b, 0x101, 0x706f, 0x0, 0x101, 0x0, 0x1f}, 0x0, 0x6, 0xffffffffffffffff, 0x8) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:58 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x50f, 0x14004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:58 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xff0f}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:58 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:58 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x1b780000}], 0x400000000000132, 0x4000000) 14:39:59 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x80003, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x44, 0x3}, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:59 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x30b590}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:39:59 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) 14:39:59 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1, 0x1, 0x9, 0x1, 0x0, 0x1800000000000, 0x9000, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x142, 0x2, @perf_config_ext={0x71729f7d, 0x8000}, 0x1000, 0x1, 0x3, 0x4, 0x54e, 0xf6, 0x101, 0x0, 0x2, 0x0, 0x7}, 0x0, 0xc, r1, 0x8) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:39:59 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x163002, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x7) keyctl$get_persistent(0x16, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) 14:39:59 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x1000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffc1, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:00 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:00 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) 14:40:00 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x1f000000}], 0x400000000000132, 0x4000000) 14:40:00 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) 14:40:00 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:00 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0xc0, 0x3, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x31, 0x4, 0x5, 0x9, 0x0, 0x80000000, 0x10110, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x30000000, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x44988, 0x100, 0x7ff, 0x4, 0x7fff, 0x1000, 0xfff, 0x0, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x2, r1, 0x1) [ 1041.391263][T21348] trusted_key: encrypted_key: insufficient parameters specified [ 1041.489859][T21348] trusted_key: encrypted_key: insufficient parameters specified 14:40:00 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) 14:40:00 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:00 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:01 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:01 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r1, 0xbb6, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) r3 = getpid() sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000740)={0xfffffffffffffffd, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7fff}, 0x81, 0x0, 0x0, 0x6}, r3, 0x0, r2, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:01 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x5000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:01 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000000), 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000b000000000100", @ANYRES32=0x0], 0x110}, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) 14:40:01 executing program 3: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000480)={0x5, 0x2, 0x101}) keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x8, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r3 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000080)) add_key$user(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000600)="1e964a085134f6574e6e923b7065e9dc983d913d5d2e7b3143f69ed26dfd4c50ddd6cab1aae9b585f7f5b254e99ef12f77b65e9f2372cfb48897a44ab1383ab3cdd0f2fb22b9620a6535c4015162b599e29d4ec51cc38c481d8e527e5e4aed65a7d2886e422f4155e6aded6c522c657f3f1773e623e96cd06a27ac19014a2ca45952e00fdcee070569656dc4440e7e0f7807df641853328321", 0x99, 0xfffffffffffffffb) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x20000000}], 0x400000000000132, 0x4000000) 14:40:01 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x7000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:01 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="760cfe48e301d5a3a7d912b3c0121235b1f1814b58b58d0c46c8745e4433704f589c2040aa4b1ca0ae513d17f75bbe9005724417440ba40da2128a37f8488be151c23d65b309054095d4af6c8f95132d1fc3d0952b20f6e063ded0e8e5169ccf15705e6c72ea58e4ded114", 0x6b, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:01 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:01 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:01 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3f000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:02 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x2}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r4 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000100), 0x4) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f00000000c0)=0xc) [ 1043.282402][T21425] trusted_key: encrypted_key: insufficient parameters specified [ 1043.374699][T21426] trusted_key: encrypted_key: insufficient parameters specified 14:40:02 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xff0f0000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:02 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x235c0000}], 0x400000000000132, 0x4000000) 14:40:02 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x40000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:02 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:02 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000006c0)={0x4, @rand_addr=0x64010100, 0x4e21, 0x4, 'ovf\x00', 0xe, 0x80000000, 0xa}, 0x2c) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) r4 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000100), 0x4) r5 = socket$tipc(0x1e, 0x5, 0x0) keyctl$negate(0xd, 0x0, 0x2, 0x0) bind$tipc(r5, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfe, 0x200}, 0xc, &(0x7f0000000640)=[{&(0x7f0000001500)={0x390, 0x29, 0x10, 0x70bd27, 0x25dfdbfb, "", [@nested={0x37e, 0x8a, 0x0, 0x1, [@generic="9b2ab11f960b0a4995b54735323fe92827a9d9ce01825c6a2e795db25ac1773123ee76d976b43daafcab92fa020f3ff2fd7031215380cf95983541ccce681ea2b899fdbbaa4e06e028e45374451d50da8cf1e26327c2b17a2fc629282b1ff4d549a563f4009f5227bf9b97a20b2126e9621b6e6844d659445f0499e923d94cd4c06c4b6e8886743de4982936b966dad5bf0aefb809022bf340a05e8c3f8d4c491cc525a324446beaa689d88319d954daee0174dd9b01937b0d022e444d9498526944c4dcd988f598e3a7ef74d29d59069c5d163bdcab9785f79c64ae96c4ef52fe104316557b2f552778c5c615c66a3cf42c4e4197fcd21811", @generic="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", @typed={0x53, 0x8c, 0x0, 0x0, @binary="5fa3447682dae392a0d4fed7f493231c5621f8ffcd6afabd94961f3a01a0a44278716ff6cac33ef6919c0960eb3f9aebb139bc7cdeb6dc68f98ce0471c381bdd2c847ab18155c408094efc152a1635"}, @generic="596104ec997887373513e96308c098c7270669049019958fedc184708da78487148544fbad545e7cd38ecb616f1ca5ddf61cd587c76a54aa118cd9a634a2979bad5f3686023c0ff6bd8142568c8f3f7ddf6936fa041da95d0085fa0ca3fe06e28e9988cfedf70085bb8b60ef3713058b83de782d590254a611c64d340cbb9b3e4000c1544ee5330800f4d074b8b5e95d429451", @typed={0x4, 0x8, 0x0, 0x0, @binary}, @typed={0x95, 0x1, 0x0, 0x0, @binary="35222053ef08e7fd1f08217ee6caa52250f31f5179b01f30273826671bb870fca44cb9dba7bcdfcc5aee9cbc9818dc81ee10f766922e71d4ba80ef07712e56f066e18ee3f4a47df22f64c9d4736b79b3daff9c8b3fbe531113379601f6e87a7f70228d1b5341463f9272319a334dd10bf4b1e701560e469295de03e0b26fffb96135bbca2eca18b69f09c81da500a5238b"}, @generic]}]}, 0x390}, {&(0x7f0000000080)={0x15c, 0x2c, 0x400, 0x70bd2b, 0x25dfdbff, "", [@typed={0x8, 0x2b, 0x0, 0x0, @ipv4=@local}, @nested={0xbf, 0x15, 0x0, 0x1, [@generic="d4da9b23e8e40436fcaa1ca6068d3310716711a1d55cf5e467b63e5bde577e6678153ba243ec8eae510a9cb00d47c7ab9f02abc9cbc81f87d1d96559c0a36de86368607fa2f56270b39d3baf2d54c76591964169ed20123298062cdd0bdf479e041573e378b45c603c35031c0acd91ce448cd4919027c4279fa79c9c92a43b1fe99521321acb557b012ac6942a1599448d5eda40dc3798165386c5e016f2edbcb8883846f93c964fa22cedd7c43a217c5d622db92fe28a76d5f4dd"]}, @generic="8f820e25b39a0c7f83f4794694472657398e76b6a4b74514da2547c45f14ec70d368b055fadbaa343d2170caca00a2911bb2af7bd269336f4bea462d21552b217c2ffb0d120fdc46585b2b7fa5f78963f594d78071dd458da8985df8e976c7c6e6737149efa24e9f331a87c1c0e5dfb610162d4edcb7dce649a4c7c35f731ebfbb05"]}, 0x15c}, {&(0x7f0000000200)={0x30, 0x12, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@typed={0xc, 0x1c, 0x0, 0x0, @u64=0x7f}, @typed={0x8, 0x14, 0x0, 0x0, @pid}, @nested={0xc, 0x3b, 0x0, 0x1, [@typed={0x5, 0x91, 0x0, 0x0, @str='\x00'}]}]}, 0x30}, {&(0x7f00000027c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x608}, {&(0x7f0000000e00)={0x258, 0x16, 0x100, 0x70bd27, 0x25dfdbfc, "", [@typed={0xb8, 0x8c, 0x0, 0x0, @binary="967bdfa26c2161d1a8ca87d6e3e199cd57d15b7041ee72f5ba2052752c59ab6138f523b595eda86b104d4ec9ab7bf8f6b4e7b4b5d2d764b6fe6f3cd4d952f0f02f5b639fb6396109a5c171de2a52b57085f4fc2fc2eab924ab9ca6376af2e704d890727a23aa0c25c9cdfb0e7cc37f628718d0532fa52ec32b1ac0ce9a14b1e093a6c592040e8fcf7429133a5109c7713c49e8a410b00d015d194fff088c12657ac21c760cfe686654f81222f5cb2c068316c3f8"}, @typed={0x7, 0x28, 0x0, 0x0, @str='syz'}, @generic="404fef159e3a262f85b22eee0951dac0525a94d3ca0b355935e5d27b9ed68f275e9c66e5a5e6353f216b152f", @typed={0x14, 0x3, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @nested={0xd0, 0x82, 0x0, 0x1, [@generic="fc4b9c1b864bae4cfa47a338b41491a04dfb7035582b43fc5b8a884f92e8c6b77195454f7a399f91d51df8029f2389199fa450eaf6c15b1a610b6fba3361c2fed6d4ee9e926b310caaa5378708f0eafa66519de3a79bb77e68954112137ce3ff08a03ff434bebcae1a389d082f7a869cadf043099ab331ff57590d3deb47e7ad1d492d9c6ff8437c818d1dd81c23970dd5050776aa8f268a553c781c02821dff5f0df3258b2905b073bde78f", @typed={0xc, 0x44, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x3, 0x0, 0x0, @u32=0x8}, @typed={0x8, 0x94, 0x0, 0x0, @u32=0x20}, @typed={0x4, 0x94}]}, @typed={0x73, 0x38, 0x0, 0x0, @binary="f9f136cf6c8778df5a6da2432beacf3264cdd8308910b478b37c3b1f5f016e671857d81c47e5908f092d1fcc283f1b0def7efe14508f3b0575e28093efea7cfd78e57a17cffc1fb55fdc6652be674d0c602fd5e6e305beb3561bf2cf349c0c4b8ab86fce613bcffa5a53e53cf3624d"}, @nested={0x4, 0x18}]}, 0x258}, {&(0x7f0000000240)=ANY=[@ANYBLOB="140000003200000226bd700002dcdf0900000000"], 0x14}, {&(0x7f00000007c0)={0x564, 0x18, 0x10, 0x70bd25, 0x25dfdbfd, "", [@nested={0x194, 0x24, 0x0, 0x1, [@typed={0x8, 0x8, 0x0, 0x0, @fd=r4}, @generic="5df33425f05bb0629318e36c2e88fe260df31ed2ad436810098ff687b14416cd9a75d6657601c52266e7cce79c47bcd98854447555e849eeba325e6eb17b441c1a40b947e935fda2a9788a80771c0cb44909fdb7a22c25f382959e0670a5e5a3740c2231af543af3e153a79832a74ff802a31b25b23af53e1eae876d5e04520f40a610b5df85", @generic="e111051c7f86cafe5b0a6d2c2ec80eadfac3c589755235e7aa0d7e07c2fd90acefac846087a879f78d5ce1f996044d43f8ff1242bc774f6d914056dbb339a5fdfc54f219b160483a73f5b9425a8108407687bee771e0f7416d7b0c34c9947c6286c8537df2b825341cd939492ce8863bad80b0d9946c43916d168e9f0ad119bf4bd8b3856cb94cc1ba7c691939e767a30bd4c160ecf857530bfb2830a63baf59eb3b6013573b7200ab0a586a59bbf280282c5da0d621ac8a150f15549a892a2a7adb2f6b0a2d605d6ec6ccd4a244f8a48533f8bcabb605b22e0437fe88d0137b608d0879428d8375a6b63332573bae39c9a58433f7e5", @typed={0xc, 0x31, 0x0, 0x0, @u64=0x9}]}, @typed={0x14, 0x96, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @empty}}, @nested={0x3a9, 0x31, 0x0, 0x1, [@generic="1fc28e6f60111e43ec311d85044e4484454fdf963ecdbd9557535e81260e8505f3a8b3d48ad0b5a97c48a10c7636eb677a1505918a549193b7278505d71087f26181bbd2c4f8d101b27a6799d9a371e83f4c8f1027f84c0b2c34f879a19505b041ccf0d06eee1f01c8a4a799503e7ac6524492236df69a6ae2d0390da0ba4e0fddeb4d32c60a2840c60570f04254c93b7defc76d1df103c2926248fcf2e722832746c4ccfb56bf686e362f0ead", @generic="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", @typed={0x8, 0x77, 0x0, 0x0, @ipv4=@local}, @typed={0x72, 0x7c, 0x0, 0x0, @binary="edbe9f731d97ab07ccb9f47fcfc8a69f06626a243d98a85afd46f316c82e613e3f4bdadab34a9cc30108163d30daa7e2055ae16edd2c0bf87bf6e7ac202895714f57ae2301a1f50425d22b1eb1a176479aeabe20173f3cc51016a572c176df59f1c9b5c081baa1825b1228953a9b"}, @typed={0x8, 0x53, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x436, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x14, 0x89, 0x0, 0x0, @ipv6=@local}, @generic="d24eba8bca79ad9b3821c13c9b25e323418d71ebee82b412b487edb3308a7101d12b1605ae7dfbba3443275dda9a7b68c550682b85f88400992a85e92045d2541a5731534a360773ad7feafb11faecd5d4d9be8771ce79aff62cd8d521a465d3d12985e0d8a184433f8dce2272c4ab786edf1872e3a7e0053a1d55db3c06d4048dd588097997d12b8727f44f06c22818d2c0bde590ed778ffa448505aa53894bd414f4847e6f1f2427d7adb1bf2a730422a09883180ae1f5ff97fa299fb62d23f1b244cbd61aa4b06e18f1ef467bd9d656635e4d842df0ec55908d0f3533823dc1f49f", @typed={0x8, 0x53, 0x0, 0x0, @ipv4=@empty}, @generic="26d57635eb242842b772fc8203ed2d14d18b7e8f381b99d920b65148cde3fad103fb42abd915ca9f9eb3f684ea2dd10f2a4df14200a757e7e5901d7068456d1adef2a3d5f890e4f83f08feba46ec529f639e23391e50b29caca15470400ff030c1b690f7a122330d20beee7370d86abe56ba3f"]}]}, 0x564}, {&(0x7f0000000280)={0x3c0, 0x29, 0x800, 0x70bd2b, 0x25dfdbff, "", [@nested={0x20e, 0x5b, 0x0, 0x1, [@typed={0x14, 0x51, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0x7b, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x27, 0x0, 0x0, @str='.\x82B\x00'}, @typed={0x8, 0x8f, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="9ebde560434b1d4bfae0f24e4177e6944fff1e53ce1136729f1c857c15c69362895c375647b8c37cf3a453749db6e27b8e06059b738f21e513912f4adcf5ae7be078784dcb558a791c9e652f7732", @typed={0x9c, 0x46, 0x0, 0x0, @binary="423da5442528960cec2a71323af15b401526cf7b0981099ab953754d912e154e3deaffac1d34eb7e3d6f2cae98e3039b3897aa6597ad2d9432fe85a0c9c41210fa6971b07156262b378894f182783041fccfde403b539207885d7f87781c2e2b6c120ef203105d80176611c5c5bbb3ab758f744090324e3e9a4e02c1e90492b3b2a85c4963b2b1e272bace5ad11559506adc45cd0b6ee65f"}, @typed={0x14, 0x4, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x4, 0x23}, @typed={0x4e, 0x58, 0x0, 0x0, @binary="2618290f360d4f1523a6e62de10f695800abb152e593bd936fba3ece4a3c24c5946e9cad4bd53fb6bef0b97f7f918968311b49541f67e7191a14093d0d184bf2d8faf23bca860c1208ef"}, @typed={0x89, 0x2f, 0x0, 0x0, @binary="c045b3401abba43f5be0d77b21aacf0bb294eacfbfa00d6eacd65fdcdbaf4885d9e79bd2b28d5a69d41cf59db540446fa4ae72d5a5c7ad7baafd62601a2886f5aeb779936c330ddd833e96a3d3c2120f7c6717272c9f517425c9bfa4145a82c7405d5f313ac0043cb752ebc017b0f75d06203d478751dc47c22fc952886afbd1ed699a01f3"}]}, @generic="c77137d7b7ce61c2919de20b84fb44dd8e8e74278101d5255e5b92863fc9bf234703b0bfc70e8d9d5a627537a59ebf50912c30c34cca9341378083164f958116f5d320e35a5f071899ca44f5545392b6b6fd923613da58ee91b7cfd92eb563b2056514f5fc8b4e8f318728f9108e98984284a80c1d27378045fbf482f1f766fcc22478649927ded19e1fce62e673efb0ccb51f44c335abb54f884f254eaca7303ac1a2774ccb4ae5bb8bc2c411a7fa8552ddb2e253b7facd5db968d56f949b0c83c70bd587f59dee3c", @generic="b4e33501d7614c6667c445618bcfb295f66d3cf85d1dffd808c5c9e7ee996eb6d78c89dcc208586f91eeb9dd77077f4bc3bad5009b3dcdbd48da3d46805808c2044ab6cff8f2dd49e5a9d2721f11b5481d4ac000913a04039cc29208749cf6e08900b3c3b6fbb5591b11713f4e3cd43006006fd5aae1960d091ad6012897ad1162abb241dc40f4fc5c56ab292b59f4165839bfa96596a05f51744e2acb69ba799b008d130e4f2c8cce5e7e99b649b038301edeadbce96bd6ed2c909080f0ad466785b5fa6b7d6347aed54ca3650cbc7badbcb3a56fbd6e"]}, 0x3c0}], 0x8, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r2, r1, r3, r4, r2, r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r6}}}], 0x70, 0x4000080}, 0x0) 14:40:02 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x4}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) setuid(0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000580)=ANY=[@ANYBLOB="01000000010000001800000028d11e0837856c0b79c9d9b99e72bc8c405da333d298784973517c", @ANYRES32=r3, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='./file0\x00']) r5 = getpid() sched_setattr(r5, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = fanotify_init(0x2, 0x400) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000002180), 0x402, 0x0) r8 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r8, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000040)="f4", 0x1}, {&(0x7f0000000140)="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", 0xfd}, {&(0x7f0000000300)="595872e83c0255958e4e8696746dce011d155fa810923f6b7b550ce89b63ff74a40717eff8d47d412c4dd30da974d025c6b7a11e46e238726fadb3a0afbf22b8d953794fa52a54d046a30d912bb859f97aa5bc01cd50649bda3f4bd723a81423d161c8c8ea72ccfd3337c2099842aae7d67cfb444af1d38eef6db4a4d6f17985c432fdd2e8b63394a19d4539ded9bfca36d890c667c35868a87b6823b05f737e2e64c0c5a1a69448600672c9464b885ee9b4067bd411a83fe36519a3400f38a04a24f641df7ede66dedbfd053a66a24d228a4168bfe952e64313daf20be0e07a106686e2ebd2", 0xe6}, {&(0x7f0000000400)="349baa794fcf3e08c11dcde885b2f9b0dd5c24901e75c8e5756fad54276c578da6292cf48c8472b14164b38156540b6b9d3cf45de5715de8cc2c3b1334f160e6561e0aef3bcf267e46f407f97549d4e24a31", 0x52}], 0x4, &(0x7f00000007c0)=[@rights={{0x18, 0x1, 0x1, [r3, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r3]}}, @rights={{0x28, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1]}}], 0x100, 0x20000804}}, {{&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000dc0)=[{&(0x7f00000008c0)="32a90d7210d5931c7bfeafcda01849f6f169c07d3a42c046b3ac5b931f9548ef66e5f72f4d20a7f2d4f17a0a59be3c0302fd54e2c2876c3fdad5065e22c9afab1bc6815451b55b9376cf", 0x4a}, {&(0x7f0000000940)="7571e952e7ec2b856045b6b10d4eae67cef182100372f9d4fc9d7a83b7b36bc6f7ddd87c263de88d3058f3d2b1b1533cce8cbf3cd563a658305cf1025e73edd8c658ca0ed99675947bbfe0c335a456b0ea751ef4ab0d0fb74bf04288ae469fb8015777dffdf20f63144b3d2b4934d8b00f3140d60753e670fb92e3ae39e615bbc8f605b9cdb43c07aeb1a72c23eba6731d1e964a0c9ee0d4f5e1c3296ffc37c607d92bd315e5f3a578e4ccd0fec59a9c9be577f499f99edbb87419db30", 0xbd}, {&(0x7f0000000a00)="c9cb97705c6131762aa4a8c7fcbbbf337393d96104a8bd4a0e36ffa50d451dbbd11a8ebecf1ef1219e23465bdc064178151900d733a8f684594a80fd3fa1b9b978f3f2881c6499dbb40f1cc3cfcab6d344581439d0c632291403ff1047fa8b55cc54ed07d4ac834213665b6a65096ebf06e4f09918e2dd42a9591ed5abbcd5aa948ec4201a1eb18fab4f6bcb7d85e02b21a1648823be95d9cc426519a234279cd8c10179753aa94182ee6daab5b7a2e3d4cb801ddda80a87048820915244b2cba554d10606e85f9f86e8d52ffd1f68dfb148dc9d69264f18cac099f906d0fa9bbcb26fa6df1ed3a7c7a5", 0xea}, {&(0x7f0000000b00)="c0d72d3557f62c2d4a4afaf36f20032a888b31c0fb4b9756e5f55e043d6e87c4943f40477a6e09ba328d181b6de5bc3d26a3e6472e9913804835199a1f251a11e3432aa5677e359fe192289410ef7e349bbfbed48e9a939b8a2f4f53519b4d17cc0e2539c3259c958f746e6fd08a1b729c6bce1d3a497efa4e0175e95bb6ab6bda1a209dbcbad3fe03f9a4ea063a4ce470622cfb0ae7eeeefaa465afe834f3dc09df9e5a3faa8ba16f7066eb3ec63b842e43559d0bf34b754f43f51f83f4", 0xbe}, {&(0x7f0000000bc0)="9cf68d5bd104eb6f0ea5dffd71245d207d9ac0ac47a65ac6353ae0f75ad243a68181576490a769ac418ffc77eb34a3eaf72e377c56b633debbcad8ab83cf9e5d80e511daa61ab3efd51e970a2debde5d", 0x50}, {&(0x7f0000000c40)="ad37f41e3cae5e46309b693802399a6201d153ea3d55f1f0e8eba86eda4f07374d343cbef63a3bc9c39908a7e49ac104dd79a5b2611c2bfb5e48941649a94a04d13b931b92870a0c60e0ed43cf375ba44c82338d3a65e7c46c2ccc1c96b6d7f1d13382fec7059f13179787d632d0de62f69c4d26b7990fabe900c4f18996eb3a2c7a8af1", 0x84}, {&(0x7f0000000d00)="c73162165326e97746fbe21b97e47ffeaf2fe6739595c257914cc8c7ef3b4b2475070195053b0287aeb244c411a77958f81f933c6ef3a6684a7b62a6b06fb1220b3a67d62dcbdf847eb14660893808df94ffcd058e185115101b85abc61a3ceddf684368b9841619d09c057a74c8b8880d3dc52504c6f959a612541c545d30570c05b4e3a281404ca404cb159d28c4b2e667c1edaeebce", 0x97}], 0x7, 0x0, 0x0, 0x4000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000e40)="c7d7b9014f14ea9d620d0f04fc62bda0d8a1805674738459c38509e4d038f60754ee76dfa2fbfd68de658d7b7a2d640b76cf00f856efe3d8198398692533f4f1605bd6fe515fdbeeb48bdf210cf8d3d5ad7a18170dfb091c965cd1332ed10412a834b33c53b9621a6c8419b9a8b6af97b213e5bd05e08f7ea5c634d2504b7dfe3fa3bbfc1bb7e95e5663a9baf500227431710920c2f8303e13121c63b3afcbff1788134424044e61aaaa139b2945874c4690f8db8f66a0345a2e9eb7c8c8f3a90e6db7ab55baa7271b3680282ba5a3c897fdd9b324c3e77acab8bdd70b02b12d76a0bc87b478173f8b", 0xe9}, {&(0x7f0000000700)="557e291203201b01f9ecab26dbd363a4", 0x10}, {&(0x7f0000000f40)="05942f6c264480db70857dd9d952c4fabcd4be05f17ea6ca1e7b1dd8e7b07f325cfd598791301a8d384899a4a1effe24d564ccc7fa8dd9ef1b", 0x39}, {&(0x7f0000000f80)="d3ab15979c0eaf6963f92843ce156e74895211db63ccb0620d4c869b99e5eec7a8e5a5017bb9473b1cf587a1bc7eb387cc9277651a5b517fb80d8e4c7dadf38e251988a4f366ea6e890a87141db80aaef83f7d179994f67baccd4e3ae7255c03bcd28d87f9a701506b175e4656f6ac21c84cb473bc88ad744e709f8f4052cf41dacc8c5cda722f083fd772813719da2c4de7ae3c883fd0c548f81e829662665bf6302d3aa9039a8488656988f8224411b6f69f3e1f201d090602171ec7ae3c860e4abc54", 0xc4}, {&(0x7f0000001080)="a59ab33f4c345ee4b2f8a37746c81de5457d42c92ba18ac26ab842952db440ead8d58d84213fe634a6e52575a53622f6b22da48437e29679f1b1a6a4e1c756a5196cff58ee8c44693fab3a6d034588dc8e599800017f17f2494e506afaa23a85b1b2213623fea7f4f3c30ba246d91c399eaf8f79e0644187975805887fb908d13121b30af72be33a6f09537d941ac267e2c579ed602ea05174d32b346e78f46af4cd0ca83cee72047e0fb5a5623473bf195d67217bdcb3c8e0509950c61bf03ce9c808d3bafbc46b88e9917c230eed57ed0d1f67f026fd4dac7c9964ac7b2cfacde000", 0xe3}, {&(0x7f0000001180)="f90b2050f653a16c1a0cba478095a79c0b3ea7c465c19e55a834612d0b5179c872c2d8af54d1089be8d6bf34005374a762fc9c7ac196215436d4919b37e9f147d80bea965ee55dc5b11a9dfc9974feebf8a40bb1e7d6a21cd7de7e67a5bbc4c2469989462fd0b6e4e772a61359ab7eca5fa70ee9ec74739775f402d2d9737086fdf1cc9c124b26ce6140773059ec559f1c7fdca3433dff4333a4cbcfca1db228fee52887562a5de386d0ccbefaa3259cb8a80e1b1eea19a2ca2ccadbeebcbc769c14dbc6e407973a2857784053a84222dd3aac63b5b6211b", 0xd8}, {&(0x7f0000001280)="0ee508ddf98f3b9473c8fe6b226d70f5f656555067ef5391a172356f89f95ce0f7953484a930ac46ecf9b1fe4171a7a79b2f3ac9a235fdc8f2dd7d4c486e6a78d1a5c6ec9e482d07f478d97d27021c83d2cd9a91cb98b39ca53cb1ab7bcaf01596a7828a8d818f4a8429fd1f6025fb1d8ab9b97f53ad33011ac3998f605f36a20365226d202f095b025025f5c339e0e4807fc48373ffcca8d302842794c88c0d5953a6e0ddaf12a0b261323c907dba71459c0515fb4868aa0e3240ff66b9391604b47a2c3cd3c2640119e874213ae6d16f5401ff48a2ef96cf2b37f1", 0xdc}], 0x7, &(0x7f0000000480)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="000000001c0000000035d9b10000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0xc0, 0x20000}}, {{&(0x7f0000001cc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f00000027c0)="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", 0x1000}, {&(0x7f0000001d40)="dfdd70961d6418e9e2eade3ce8ea5e685125eaa658c9076cd247a0afc23917e6c53753c31b1b5560047db8d4bbbcf8bfa241dc6f189c0c8071f4a76fb4714431d365416103b08bf3fda35642dfdbca2e5f57df88469799c22298e3135fdca3a6b3a8bcdafee172f3e930383d14e46720dfb3559ff6007f0f3885af2c38853b0c69236792c5fb0da8065ba0daddb5ed6638a806c9fb7fed805d0248cfb4a131a0c3c726c3b14e3492276ea5a77bb2d5dcdadbe819c361f6a400ec75e3809687cd6ec5f1fd6440b1ce60bb106b09b0885eaacf14abd5c28f27f2e3d3a85a23d6f8cc4b009a619bdd22e9785c2a552ab86d", 0xf0}, {&(0x7f0000001e40)="202381f9da761d7a80b3eea4960a2afb454d9a8527580d22460a9e536c62380f9e5080423cd5f8992ad22aaeba0503590c95a290820e360f55f38c3f14d2f615d429053e59dab5bdfbacf44fba254df70a4f3fbaaceced6cca2d9d7fa8af474e33e34827bae48e886269e4b902aaf12a495d3ab56928db2c6b966a26b2fe447983740af1fb83b8585b686ac340c651f93fa2220c559c77b56ecd6cb09e1b3c9e5dd561b6ce75a18e900d434d8e30905df334b43ed3a78807cb2484ed0b0275f551fed3e3b5eaf0b5189ecde0ff50199e33250be318806843c8f98324dcb3e464ef15f5", 0xe3}, {&(0x7f0000001f40)="fae956c7a966a02d2f808459c262c4d1dc11626839", 0x15}], 0x4, &(0x7f00000021c0)=ANY=[@ANYBLOB="ffffffff00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r3], 0xc0, 0x200a4090}}], 0x4, 0xc021) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:03 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x5b8cb56a}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:03 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x6380a2c4}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:03 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:03 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x200000000000000}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:03 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='@}\x00', 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:04 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x6ab58c5b}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:04 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xffffff7f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x2b400000}], 0x400000000000132, 0x4000000) 14:40:04 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000000)={{0x2f3, 0x5}, 0x100, './file0\x00'}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:04 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002000)=[{{&(0x7f0000000200), 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000280)=""/67, 0x43}, {&(0x7f0000000300)=""/160, 0xa0}, {&(0x7f00000003c0)=""/218, 0xda}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f0000000580)=""/177, 0xb1}, {&(0x7f0000001ac0)=""/217, 0xd9}, {&(0x7f0000001bc0)=""/158, 0x9e}], 0x7, &(0x7f0000001d00)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001e40)=""/101, 0x65}, {&(0x7f0000001ec0)=""/140, 0x8c}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001fc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x2, 0x2000, &(0x7f0000002080)={0x0, 0x989680}) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000020c0), 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfe, 0xff, 0x2, 0x6, 0x0, 0x8001, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x4e59596e06114393}, 0x8210, 0x2, 0x2, 0x5, 0x5, 0xd52, 0x1, 0x0, 0x8, 0x0, 0x7}, r1, 0x4, r2, 0x2) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r3, 0x7a7, &(0x7f0000000140)=0xa0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f0000000080)={@hyper}) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r3, 0x7ab, &(0x7f0000000a80)={&(0x7f0000000640)={{@host}, {}, 0x400, "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"}, 0x418}) r4 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r4, 0xbb6, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000001) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r5, 0x7a5, &(0x7f00000000c0)={{@my=0x1, 0x9}}) r6 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r7 = dup3(r6, r6, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r7, 0x7b1, &(0x7f0000000000)={&(0x7f0000000ac0)=[0x6, 0x5, 0x7e1, 0xa6, 0x2, 0xf64, 0xffff, 0x7, 0xf0, 0x3, 0x8, 0x7ff, 0x8001, 0x7, 0x0, 0x1, 0x7, 0xfc, 0x1, 0x7f, 0x8000, 0x0, 0x80, 0x800, 0x1, 0x800, 0x100, 0x8a, 0x3, 0x7aa, 0x8, 0x6, 0x7ff, 0x5, 0x2, 0x5a, 0x3f, 0x5, 0x9, 0x0, 0x2e, 0x9, 0x4, 0x7, 0xfffff801, 0x10000, 0x4, 0x101, 0xa2f, 0x3b1, 0x7, 0x5, 0x7, 0x5, 0x3, 0xefc, 0x6, 0x6, 0x81, 0x0, 0x7, 0x4, 0x4, 0x7, 0x6, 0x7f, 0x80, 0x6, 0x7, 0x0, 0x7, 0x5, 0x3f, 0x1, 0x1, 0x0, 0x8, 0xff, 0xb6, 0xdeae, 0x7, 0x1, 0x7fffffff, 0xfff, 0x2, 0x6, 0x3, 0x1, 0x673c, 0x6, 0xffff80ba, 0x8579, 0xd18a, 0x24f, 0x101, 0x5, 0x8, 0x3, 0x9e2, 0x100000, 0x5, 0x9, 0x5, 0x4, 0x1000, 0x7, 0xfffffffa, 0x5, 0x40000000, 0x1f, 0x3f, 0x400, 0x5, 0x1f, 0xfff, 0x3, 0x3, 0x80000000, 0x1000, 0x9, 0x0, 0x624e, 0xffff, 0x40, 0x3f, 0x0, 0x3, 0x1fb, 0x6, 0x401, 0x8, 0xa97, 0x8, 0x51, 0x4a08, 0x8, 0x1, 0xb48d, 0x49, 0x1, 0x7fff, 0x80000000, 0x42, 0x1000, 0x1, 0x0, 0x4, 0x81, 0x6, 0x0, 0x8, 0x2, 0x7, 0x1ff, 0x400, 0x10000, 0xc6, 0x275d, 0x7ff, 0x5, 0x4, 0xd7, 0x0, 0x7, 0x0, 0x4, 0x100, 0xe7, 0x1, 0x5, 0xfffffe89, 0x0, 0x0, 0x5, 0x7fff, 0x3f, 0x4, 0x1, 0x80000001, 0x4, 0xffffff00, 0x1, 0x2, 0x68, 0x5, 0xda, 0x5, 0x9, 0x101, 0x4, 0x8, 0x8, 0x5, 0x55e9c226, 0x7, 0xffff, 0x3, 0x6, 0x123, 0x5, 0x7, 0xa3, 0x8, 0x60dd, 0x1, 0x3, 0x7fff, 0x1, 0x2, 0xfffffffc, 0x400, 0x3, 0x0, 0x40, 0x8, 0x5f, 0x80000001, 0x1, 0x8a3, 0x1, 0x81, 0xfc8, 0x600, 0x4, 0x0, 0x5fe, 0xfffffff8, 0x24000000, 0x8, 0x5, 0x80000000, 0x1f, 0x5, 0x6fde08eb, 0x80000001, 0xf92, 0xea7, 0x8, 0x73, 0x2, 0x4, 0x7, 0xd3a, 0x5, 0x401, 0x81, 0x6, 0xcfb, 0x8, 0x4b2d, 0x8, 0xffff325e, 0x8000, 0x3, 0x7, 0x0, 0x1, 0x4, 0xffffffff, 0xfffff71a, 0x6a8d, 0x6, 0x8, 0x5, 0x1, 0x7, 0x9, 0x101, 0x5, 0x6, 0x80, 0x7, 0xfffffffd, 0x3, 0x7, 0x1, 0x7, 0x4, 0x5, 0x80000001, 0xfff, 0x3, 0x1, 0x7d, 0x8, 0x0, 0x3f, 0xcde, 0x10001, 0x9, 0xfffffffb, 0x4, 0x5, 0x9, 0x64, 0x9b, 0x0, 0x16, 0x9, 0x5, 0x71, 0x3, 0x7ff, 0x2, 0xd319, 0x2, 0x9, 0x3ff, 0x4, 0x3, 0xfffffc00, 0x89a, 0x7ff, 0x9, 0x8, 0x100, 0x4, 0x44e5, 0xc6ca, 0x0, 0x2, 0x101, 0xfff, 0x41, 0x0, 0x7fffffff, 0x1c000, 0x5, 0x7fffffff, 0x7, 0x317e, 0x3, 0x7fff, 0x3, 0x3, 0xffffff01, 0xfffffffc, 0x4, 0x3, 0x9, 0x977a, 0x8, 0x400, 0xf8, 0xc3, 0x45, 0x8000, 0x7, 0x1, 0x3, 0x800, 0x5, 0x3, 0x2, 0x80000000, 0x8, 0xa000, 0x5, 0x2, 0x80000000, 0x4b, 0x3ff, 0xb20, 0x3, 0x80000000, 0x101, 0x3, 0xcd500, 0x8, 0x4, 0x80000000, 0x7, 0x3, 0xea8, 0x1, 0xfffffffa, 0xac, 0x7, 0x3, 0x6a3b, 0x2, 0xffffffff, 0x7, 0x40, 0x6, 0x3, 0xf0, 0x9, 0x64, 0xffffffff, 0x101, 0x80, 0x3, 0xffffffc1, 0x1f, 0x1f, 0x4, 0x0, 0x8, 0x0, 0x101, 0xfffffbff, 0xea9e, 0x0, 0x7, 0x1, 0x10001, 0x6, 0x8336, 0x200, 0xad0e, 0x6, 0xfffffffc, 0x10001, 0x401, 0x80000000, 0x2000, 0x0, 0xffffffff, 0x9, 0x1f, 0x7fffffff, 0x5, 0x4, 0xd32, 0x8001, 0x9, 0x3ff, 0xc, 0x7, 0x10000, 0x1fc1, 0x200, 0x62a, 0x1f, 0x7f, 0x3c, 0x8, 0x80000000, 0x1, 0x3bd, 0xf, 0x6, 0x100, 0x80000001, 0x8, 0x0, 0x1, 0x0, 0x0, 0x59, 0xe8, 0x9ac, 0x8, 0x5, 0x14, 0x80000000, 0xffffffff, 0x4, 0x6, 0x950, 0x9c, 0xc7, 0x7fffffff, 0x4, 0x8, 0xffff7920, 0x6, 0x7, 0x6acc, 0x5, 0x7f, 0x1000, 0x80000000, 0x32a, 0x8000, 0x4, 0x4, 0x2, 0xffffff01, 0x4, 0xb9, 0x9, 0x10001, 0x1, 0x21, 0x1ff, 0x957, 0x9634, 0xb6, 0x6, 0x3, 0xffff, 0x8, 0x85, 0x7, 0x4, 0xfc0c, 0x1000, 0x80000001, 0xfffffff9, 0x1a4, 0x400, 0x7, 0x0, 0x4, 0x1000, 0x1, 0x3, 0xa8b, 0x9, 0x1, 0x0, 0xffffff04, 0x0, 0x8, 0x49, 0x8, 0xa58, 0x7, 0x5, 0xac, 0x9, 0x400, 0x800, 0x1000, 0xffffffff, 0x4, 0x101, 0xfffffffe, 0x401, 0x2, 0x2a56, 0x2, 0x2, 0x5, 0xb6b9, 0x0, 0x96, 0x77c, 0x8, 0x4, 0x0, 0x3f, 0x95, 0x80000001, 0x4, 0x9, 0x7f, 0x5, 0x0, 0x0, 0x3, 0xffc, 0x4, 0x3, 0xf3e, 0x7, 0x2, 0x5, 0x7f, 0x11, 0x17a, 0x3, 0x2, 0x8, 0x2b6, 0x9, 0x7f, 0x7fff, 0x3, 0x7, 0xffffffff, 0x8, 0x9, 0x5, 0x4, 0x3, 0xf1, 0x8, 0x8, 0x8, 0x7568, 0xfffffffd, 0x0, 0x2, 0x6, 0x6, 0x400, 0x6, 0x3, 0x9, 0x0, 0x6, 0xff, 0x4, 0x0, 0x1, 0x6, 0xffff, 0x3ff, 0x1ff, 0x401, 0x1f, 0x0, 0xfff, 0x5169, 0x1, 0x10000, 0x7fff80, 0x3ff, 0x6, 0x80000000, 0x200, 0x4, 0x3, 0x230b6a55, 0x1f, 0xa25, 0x80000000, 0x7fffffff, 0x4, 0x1, 0x118, 0x9, 0x7, 0x8001, 0x6, 0x3, 0x8, 0x40, 0x8, 0x0, 0x3, 0x0, 0x5, 0x6, 0x692, 0x0, 0x5, 0x1ff, 0x3f, 0x5, 0xda79, 0x34f1, 0x5, 0x6, 0x0, 0x6a8b, 0xffff, 0xfffffffd, 0xfffff7b5, 0x6, 0x5, 0x7fff, 0x2e48, 0x8, 0x9, 0x4c55, 0x10000, 0x1, 0x3, 0x1, 0x8, 0x400, 0x4, 0xff1, 0x4, 0xff, 0x5, 0x80, 0x7, 0x2, 0x3, 0xfffffffe, 0x9, 0x1e, 0x8, 0x100, 0x7, 0x40000000, 0x4, 0x4, 0x2, 0x3, 0x1, 0x0, 0x4, 0x19bc, 0x2, 0x7, 0x6, 0x3f800000, 0x9f18, 0x0, 0x80000001, 0x1, 0x5, 0x80, 0x1f5, 0x3c08d37a, 0x4, 0x7, 0x4, 0xe61, 0x1f, 0x8, 0xca, 0x6, 0x0, 0x80000001, 0x8, 0xdc0, 0x7f, 0xd80, 0xa5c, 0x1, 0x4, 0xfffffffb, 0x14fb273c, 0x8001, 0xfffffff8, 0x42, 0x1, 0x25, 0xfffffa67, 0x8000, 0x0, 0x9ee, 0x329, 0x80000000, 0x7, 0x4667b7c0, 0x4, 0x7fffffff, 0xc06, 0x1, 0x7f, 0x1, 0x1d80000, 0x6, 0x5, 0xc9b, 0x20, 0x4, 0x0, 0x2, 0x9, 0xff, 0x999f, 0x3358cfcd, 0x0, 0x63e2e050, 0x6, 0x1, 0xfffffff8, 0xfffffffb, 0x10000000, 0x8, 0x101, 0x8, 0x2, 0x0, 0xa5e8, 0x9, 0x2, 0x0, 0x6, 0x8, 0x1, 0x7fff, 0x7fffffff, 0x3051, 0x40, 0x3, 0x0, 0x7, 0x80000000, 0x5, 0x2, 0x1, 0x2, 0x6, 0xffffffff, 0x5d3, 0x7363, 0x4, 0x7, 0x33, 0x5, 0xff, 0x8, 0x80, 0x0, 0x1, 0x3, 0x2, 0x2, 0x6, 0x3, 0x800, 0x7ff, 0x200, 0xc, 0x8, 0x4, 0x8, 0x8, 0x1, 0xfffffff7, 0x1, 0x4, 0x6, 0x9, 0x509, 0x1000, 0x1, 0x1, 0x3, 0xaeeb, 0xcae, 0x7ff, 0x5, 0x5, 0x1, 0xfa, 0x5, 0x3, 0x9, 0x1ff, 0x3, 0x0, 0x60, 0x9d, 0x9, 0xffffaa87, 0x40, 0x10000, 0x1000, 0x1da0b8de, 0x10000, 0x6, 0x5, 0x4, 0x80000001, 0x7fff, 0x7f, 0x9, 0x8001, 0x13, 0x7, 0x8000, 0x5, 0x1000, 0x2, 0x8, 0x7, 0x6, 0x200, 0x6, 0x9, 0x7fffffff, 0x7fff, 0x3, 0x80000000, 0x2, 0x272c, 0xffffffff, 0x2, 0x2, 0x80, 0x4b24, 0x10, 0x8001, 0x6, 0x7, 0x0, 0x2, 0x1, 0x80, 0xd75a, 0x5, 0x8, 0x7b, 0xfff, 0x80000001, 0xd6, 0xccf, 0x0, 0x7, 0x9d4c, 0x1, 0x10000, 0xb5, 0xffffffff, 0x66e, 0x0, 0x5, 0x43, 0xffffffff, 0x0, 0x9, 0x2, 0x9, 0x6, 0xa8, 0x0, 0x7f, 0x80, 0x1, 0xff, 0x101, 0x7, 0x8bde, 0x5, 0x5, 0x1, 0x6, 0x8, 0x2, 0x2, 0x7, 0x400, 0xff, 0x6, 0x9, 0x80000001, 0x7, 0x9, 0x10001, 0x1000, 0x4, 0x9, 0x6, 0x7f, 0x7f, 0x6, 0x400, 0x10000, 0x911f, 0x0, 0x7, 0xcd9, 0x80000001, 0x1f, 0x19, 0x3f, 0x3, 0x401, 0x1, 0x1000, 0x1, 0x5, 0x8000, 0x1, 0x87be, 0xd6e, 0x574, 0x1, 0x1f, 0xfe, 0xa4, 0x80, 0x101, 0x12000, 0x33c750c7, 0x3, 0xfff, 0x5, 0x6, 0x7ff, 0x6, 0x8, 0x2, 0x5, 0x101, 0xa8, 0xfffffffb, 0x38b, 0x1, 0x30, 0xfffff621, 0x3, 0x9, 0x200, 0xf0, 0x67c, 0x8, 0x29, 0x3ed1, 0x1000, 0x9, 0x3, 0x4, 0xe6d, 0x100, 0x20, 0xfffffffe, 0x203, 0xffff, 0x400, 0x9, 0x3, 0x2, 0xffffff00, 0x8000, 0x9, 0x9, 0x2, 0x2, 0xffffff60, 0x9, 0x5, 0x2, 0x0, 0x7, 0x9, 0x1f, 0x5, 0x0, 0x5, 0x6, 0x9, 0x1], 0x6, 0x400, 0x588e, 0x80}) 14:40:04 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x90b53000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:04 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:04 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='s', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000003c0)={0x0, r2}, &(0x7f0000002000)=""/4096, 0x1000, 0x0) keyctl$assume_authority(0x10, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x4, 0x3}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:04 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xa6010000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:04 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7190}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x18001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x3, &(0x7f0000000040)='syz'}, 0x30) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x1, 0x9, 0x40, 0x1, 0x0, 0x3, 0x20140, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x1000, 0x80, 0x4, 0x4, 0x400, 0x3, 0x0, 0x80000000, 0x0, 0xff}, 0x0, 0xc, r1, 0x16) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x30000000}], 0x400000000000132, 0x4000000) 14:40:05 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xc4a28063}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:05 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000000000100", @ANYRES32=r4, @ANYBLOB="0000e5ffffffffff270012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000680)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@delchain={0x24, 0x64, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, @phonet={0x23, 0x0, 0xfd, 0x3f}, @l2={0x1f, 0x8, @any, 0x9}, @xdp={0x2c, 0x2, r4, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x6, 0x9}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='s', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000003c0)={0x0, r5}, &(0x7f0000002000)=""/4096, 0x1000, 0x0) keyctl$search(0xa, r5, &(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, r0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1046.401306][T21539] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.3'. 14:40:05 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xfffffff5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:05 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:05 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "5be42d75649af1d3080f8f154597b59a57d6b0468a69b779f97b112ccfa33bf904b67e6af8fe3e9c92cc76aff9fa28ccf0257e4379f2746837f3aeda3332dfc8", 0x27}, 0x48, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 14:40:05 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xf5ffffff}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:05 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x31010000}], 0x400000000000132, 0x4000000) [ 1046.766105][T21564] trusted_key: encrypted_key: insufficient parameters specified 14:40:05 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000000)=0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1046.839006][T21564] trusted_key: encrypted_key: insufficient parameters specified 14:40:05 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xff0f0000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:05 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6bd, 0x6}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=ANY=[@ANYBLOB="00fb5904323d7641770caa3223d85655a2026e90d1c69e36095047fa919b5ce104780657e81f60d9e21a98dbb83ed20a9f0c8fbd9fd15617d2e4cce2bd5fa8f7043ff160298d3950204a065a82fe92e9d295d80307b7b49802"], 0x59, 0x1) keyctl$link(0x8, r0, r0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x3, 0x3}, 0x10) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000007c0)="171e6c2f23ca4128a64551703c88209eb9f8c174c2a444d6c1ee9114ea062dfb6d1594db106af1fe0f5f7adbc20f09b75acb3501a247de7d9b1f1a9b54a8d3b71e99d2d42f271e2682a07f73c8fa02a8b4cfa923f394835a3069e5406aeff38b8423d49ff6a5610751cb97acbafb7090ea8a83360c795c75ad4be79dc20412e0226cf8961531920535aa3e93d508f738c59f1320a9f9728c6508fef082914c980db30d0702bad413b40c2a8a0db1670bffc7d1103195f87ce2bb9599dd76f7ff993aada818d11995267d51998921e16463779ab776339dbf1330ef853ddbb3c71b9af73a315c6fd4b60240b13d8b2357f8bb7b4f3650e40e3bcf60c3b2154c6702fd04ac8e5bfe5a7c93448b4d8973262f96426aa64342ea4665a5fe555fc0338e9c3d4eb28496b2ac8d8f7e5372ddd33291fa5f1f9fc024def105d30dd87486388e7cdade596d55faf2f3ec03ba6269e021e93ea854f70c0498c8c1a0189de8874e52791fbf908e35315704c2284152120869d4dabc37061aec693955cb7af54ddf873132d37aa9fcfe7aef2b699aca57e2e4c8bd95df8e066df13f01f0ca246535478e0324382ff9ea857517c493da6dde78f3575bafa675f35d738cf73d9a6c9a1cb6fe4ca9386ca5e26ff839afbbc0921e4f058658c2c04af78546f50e6be637a15529ff58316829acb1b5824482739a1f59b7a105e8484d03b167a29ced3a8558d13e038ee5bc688765b9282a9157ff75247cd377aa83f6740597322702b65bd99dd4e626a1699a6e0d32827919ca5377d4bf9290b7791991cd817f3770f4fac57802dd1ad6a34ebed2be7d8126ce6e9dad02d773e263bf0ab70a523a79884d500c09ea7c9e515509044ac0b756e149c2151e6495527cc746410bef24ae67a6e47a3ecbba476695c72b485f82d4c083e12a79115116c81699ce97fe21b8632ab713efdbbc622e86e0ba3903997ff30f583b23867e6899df2aef650b4f18fe417d6f99b96201720d9f176efc872724efd1292f5ac257845442a5740a1ad227b9293480988b8e6cfeddcd8d3e2dd40af9574b4e9c8bbe3a67192f43011b513680a222148bb4b9f573d81063cfad9bb40c958a66377f71a0510164dbb128c3cc04a78df696689e27d590fd2779978b79501250d071a639d15820ace9e54995b4c18ea8302f6647b9b9cbce59a4d72f2c7049fbc8e7ec56a5041270e80ae58423d31a2c080031ef76a74a58407d786910cbb7f6504bd4c304f7545e630bf445f31f987599b51742df0b4599b4e8c357406105031afef099386b69d504bce5bb633d5dc083e6664b08bb039d89f96801da4c685f68e7e8c0fbf64780d2d7ec21cd468978fab414b49af0e3ec18a65d62206816582bd0c07deddb46f5e3e8f1d507ac2003fdaa04be55fe436d0e0fd471b40c81e6ca602692fb5e3ddfbd5862930a52885b6f87cc85a8bfdc31f3d6dc8830ae74fa7dc4322aac52e66408a0691a36d0c294d71070eb1682c1f99e8a6ce856ea53ad134f5829e91f5ad6f336e57ec21ba63c4f29a30f627e0ad52e2d68bd30d31b45493618af94bd6a3371f59111b4854188ff57cca8be2d69cc98129b3d8498f8970080abb5e5eaace28b687f2fc5e9688cdd76ec3d5d720586e1dd25be996af357082a6c905b71d9c618eb59b85106d908e134d593e7f63e275286e2b42901ea6097f6c8ca0b13730defc373f04e2a597149e5853a1604fb92418a2ecd6b905ba8dd9006907be032efdc3d55c40804e25523e6172612b5068e5466bdb258e9d699144fc0ccd5eecddb6c2fc7379b6b1f71c186c35518dc1877e257d756a2628dabe1eeef6564d3af423c43efdbcaae1e0db3e0c5a4374c6954608fc88e0908faf2ef9967f54059283603b85c94a27f1fd4459fddc527c6ece815210aef771a66f4d9dbe8dd767cad4dd7497f9f3ed2f52fd1feef0d226ccdcd021f91451e4a10a8c07ec86cfabf91447dc1d567412b26ee2d691fd28a76e8d45c23f4f880d73939fd84afbe967e1eee6c2b73d980271324876f71264a2740336bf01b86289a01a1efcd8a7b98fa672631380a0688442df360c9e53e71566cb48a682c83bb0621a9bd1ea889316a635e9d35d022ec0306f45df4d2e69cc179e6d7a09495260e07fc53138050927b8a0b4b3a2120efb5a9597f7b9ac988d88b56d4d531a28404cb8758a947be4c605ceb4fcf79a59c2bdb8760f6a38a5648bfc7e89aa50f43e10649de735db37f7e414c3d5265cf3b2a0bf79cf358bdf483c73645d82a11a02365e9356c31d92365a6a94078b414420076d67ba561909d53ada124b3d2af4db2cd73f404299c5f08d0d66e6c39c816e0dee7b9306adfefbbb92fcee9aa2b5295d9393d869208f1e44cdc0a41a1b71426148963a093123da1534c1cd4e8a4ac9c6d5c5a9f1e05e3b45ab128fd01d00b6a2301f9bc7648a801c60039cc758e9f80dc2e740c7ecb291e38f81c0998f16d2492ff1faa5c05fc37f1443cc2f4698ddf5b0e1ec9852e57768892d23158e59bff16e93029a76847d1a3dd912eef4b21da1540504845a6ddfbe57b1a48c57fccdd75156cdde35ec247f29e757d9ce436f7d3b81766871e6b88379c043e5fad1425362a30f69a7068860d96b2fa04bdb812c420465dbf2dabc15e34660d0fc67dbf942770f8c14ab53bdc880118ce5677cfac58c46b0bc5634c95eae4148e9c5e6cc08054b9a860e8c95d316636fa43d011d3cd802025aa3817f2bde82b7d4cab72691fd91b4bb9cfddcd62fd143119d27a1bee654b7e098eeaef2b969c742677a2cc3f5b49ad4072b1825cd0b943201a1b12e37fc22870083a4543c10f34b6bac56f0a9793de084212f2951b110218c9a75e9083cf68f3831a255d6fb09b7591a004e27d90efcf5598a9f383edb7817f9da106b6bba43f62aef7d4169b34778f4fce760a3687b7fc49af6fe447cc8185ee873233156715c826a68fd445a089e73cec30ade94d24dfe56e0f3c98d485bb1c218a3eb0472decf39258d0d41bf473626b449ce12748053718330998af94ca4847edd0b8b70daa12262c587abe6b8252560c4e67f6610d23137e848a23d27e64b69ef4b26c28de2a169b84cb06366ddc096fc0d8de192e004e3795123c1d70105c9f8b0af46e1e75870edab129731948519693c6dc1b5d3b8c13df684cc1d94416c04384e60d494387f1c90a815a01f803cb14eaa1172cc269142c6b3b874c93ffac90299bd0ed8feefdd6bcc8163fde30c23116e1a594d767423258544811fefd5e829b95d284af49d2f184bdc3eba39f9bc22d044c4128af31a18b2ad4f86b7d42828801b1d53541cc797c3939a618eda7dd8f1a634cb96ae352c9af2d69434b0bf93318a49b67784040957d7084d20552b3e6188efe8fd12386c01f3dcf89a2bc8de2870443eab3327bce177c72405db4cbb4167a559db09baaf45ff463550b6e72d68661e945bf18bde33837f7b48ee6948e22d5afebc0c9958989bf4832fc4fcc80068adb8c34b544a5d8badd0537cc984d54a9aafbfe8926a908a042c5a016029e8c4068f22671276e05aa2e99c46a79ece5ced6a775ed27c34d516bd4c583ec3995da2f1f7f5140aab8e6f9b6b2d8c8dce26aaebbf1eb1207d59b915acc960eaf206f908302fddea67fcbeadd3d58a830dc0883070c1a8b34a5d7dffe861f5deb9e0d86876b7040d642e499677515d6619144c3c8ca5cdd7b9402e005a8717645829e7e7217da93ed3e40cd6d25c89be9036d3c455bfb2ef816fd0e26d9bc0e57267a3df664e7bebb37af8c9d00acf21499844ef35a977a47509d6af97391c932c9dfa0fb2c84e14a7d46314f86b958bffa66475854fcb19169f453193ecc97dbbc0fc84144919db17efd21b4769931f4c80bc1f3bf3d4df33aa20325f208854f5bfebbd0275603e4158af399d1ef7ef8009a637c71aafb4b40830ee438b91ce615c4f9ec42fab92efabb2d7444865ccb53c3da7d5615637dc828f655553de2bc4a01e036c9cc9d3b7aefe4e3f1605deacb7dab1d97e2662a68580f019d81dd8e3d264c0bf8d5250d8ea6cfe2ca9a09ff03cbcff09b98dc7b5d8e789814063e71327fd3b2c5a119a692d3e111c7d98757eb1676e6b44933e8354f3fcacba86431bc881d86174c80ebbc01a0adc19ce912a467a3ec270572e98f301b0ae08235f4c66fb98fbfd313b380f6b558a15020e49616980bde7f4d9178e68a7c5b80ec706495cebf9995912e02eec6596cf1b2af6aba9f9964cb51bdee4d86c370047bb8f80cf675263b0c646face260d9bebc9bc9b09b6c6cd24a62d978e0fe0744c5045ae9df23942e8e338338379dcacc473ebbc4b0bab5d88342ed42ed2ac4110663552f4f0f339aba3c37a52e2e22ed8b3765f4fcdebfef76a5dbbdb484f9f3ffe92b3370d18ebe506bd596f2d46b176ec35d13cdc1f82099725ffa7b9566b7d49ed932ea4e42db43946157442a71dce221dce03ac49ed7a8ef42242eada7d589a8c77c9a79e493efb2b3202d7d2374d84139408f2aa1a28125c39cff27cc1e87871f2bee0f5d67dcb5cd2997901fb6e4c6388a3784ec9d4fa8b661fb5ec91795a3831489afe6716d8cd24554b045f669efdea1da29bac78ea72c10149f157a49d82aa8b003802386896c7beb86706218153c46ff510ca0835d02daa655f1a3f0867a69abc8f14e1cc8a90ac867b75f04c06aa142341f45bff827d751756a61a8034e8306f44c538901400ef664c4f505ce6e17220f4d808ef5df3aca2136a83ce63621c52434c3d48b30cf56867477ecff848fafe27c890a90eee37a2a8d87fd8387570010bbb24e932e8c6fbf1bc3822861b4b04064a6580bbd58ad9a6854982d22bc1603903b1323de26071f0d05c054267299315b4abe570bc321caff01031668864b8800c6b010cc937ecac1d61e8b53ee1b8aa739e3394445c2ac975e2816460b3cfd250643e27c9772c337516f81baf9fa3ef91959a3dc11102058aa272677fc27f2763ab34aa9cdbed63cfe8ded40cd95d809f30c16b98785cb09a656df84f6d6be241f540453b73347a51288869d13748a483edf94af348623e7a4d069563861dbc9b074c1e6ee30be671c1113beed1d6bbf9e10774fc6d266683faefdda658c494b59e5fea1c19ba4dff3430696d18d31f77f26ad0411cd5dcb397c47e963b243100abd8dc8268044f7d5c6b8473711b6e83ff43cd61cb733d02126d757b1c4e3db1fe290b1eb86cf87f38bfe211f9bd6f306e1efe093aa00130defec87974328f0abb593eefe988de16dc4612a354744a89a390f0a4728e5819674f7bd3d3d5e66ebce449189703389797f05f780cfdad5cdf58507aa451999c1fa36fe5473ded1e8cc0dc3098e349431eb61660727c995f76076e6a9f48af5c386ac192edcf240e5a9da3f5118a582ee6c8e69bc7ac35b74c70a654f16fd5f3bb50b9b26c35afcb5cbb1da03e4cc1a5194ae0a31621ba25858a1d2fb8e4539b0f53bbb6ff09e8e46277cf23a4d42c98154eb43d9b698eaceb6e7d947178d48d07abe6f429a7e7f1348d0b8cd7885bdcffae7e92b97d189d002e4641a9beaa6a0d9153b4d2b5d097141344acd817b29d5f095ee7ac111646914c1ca7c0cbc78c4d9c11fe744cf99c79212be37191f78000c737b3679bfb1fa3ca47768292615def04bb82a4603f6f72e679c790643a903bfd6ac6e7ea204bff78b9d3e23d98721a6a2c20d836016e8f1d3ab0ec9531f5a1520a89885ce299040d8d1e5d38d36984753e7b18f278f45072c0965", 0x1000, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r3) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x4, 0x1}, 0x10) 14:40:06 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xffffff7f}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:06 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:06 executing program 3: r0 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), 0x4) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_delrule={0x70, 0x21, 0x0, 0x70bd29, 0x25dfdbfd, {0xa, 0x10, 0x14, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10013}, [@FRA_DST={0x14, 0x1, @remote}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8}, @FRA_DST={0x14, 0x1, @loopback}, @FIB_RULE_POLICY=@FRA_PRIORITY={0x8, 0x6, 0x9}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x2c}, @FRA_SRC={0x14, 0x2, @loopback}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000800}, 0x88010) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0xee01, r1) r2 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x5) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='-\x00', 0xfffffffffffffffa) keyctl$unlink(0x16, r2, 0xfffffffffffffffb) 14:40:06 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:06 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:06 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x33240000}], 0x400000000000132, 0x4000000) 14:40:06 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xfffffff5}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:06 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x62, 0x38, 0x37, 0x32, 0x63, 0x63, 0x36, 0x66, 0x35, 0x1, 0x62, 0x37, 0x30, 0x37, 0x38, 0x33]}, &(0x7f0000000080)={0x0, "be255eeee6f1ac0f4904bcc4787536a540631cb05220b86e61a2dd13d1fbb8cfb7cc89ab631bc78dcb72b765e64387df3b769c331c1e884555aeca955cddf450", 0x30}, 0x48, r0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r2) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$search(0xa, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:06 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:06 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1048.118079][T21623] trusted_key: encrypted_key: insufficient parameters specified 14:40:07 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 1048.209732][T21629] trusted_key: encrypted_key: insufficient parameters specified [ 1048.278091][T21628] trusted_key: encrypted_key: insufficient parameters specified [ 1048.305496][T21629] trusted_key: encrypted_key: insufficient parameters specified 14:40:07 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) r2 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='%:\\&\x00', r0) keyctl$instantiate(0xc, r1, &(0x7f0000000000)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', 'keyring\x00', 0x20, 0xffffffffbcafd3e9}, 0x30, r2) 14:40:07 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000007c0)="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", 0x1000, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) 14:40:07 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1048.790441][T21644] trusted_key: encrypted_key: insufficient parameters specified [ 1048.907831][T21644] trusted_key: encrypted_key: insufficient parameters specified 14:40:07 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="0d686fc8da676ec9db203f9b8f116223a5a21a9d0952d3771372d2e855b54d441e", 0x21, 0xfffffffffffffffc) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:07 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='keyring\x00', r0) r1 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1bc9ef32a5583a1a181871a80531fb6b904569a139551874afa54ea0dd4558508ce4041917a1755bf33232a6bdca0434a72d894f21e9ead6c919", 0x3a, r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r1) 14:40:08 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:08 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x3b080000}], 0x400000000000132, 0x4000000) 14:40:08 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:08 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, r0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x9, 0x5, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80000001, 0x1, @perf_config_ext={0xffffffffffff55d4, 0x7}, 0x0, 0x100000001, 0x80000001, 0x0, 0x3, 0x0, 0x100, 0x0, 0x7024}, 0x0, 0xa, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r2, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, r0) 14:40:08 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:08 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) 14:40:08 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000)=0xaa9, 0x4) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:08 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000140)='syz', &(0x7f0000000180)) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)="ed55cb4a109297ef722123355bc45fb4bbdc1b90e96c876fb3e2009d4875154ce81ebcba19e779910d3625c8125effa401d2a2aff836629be43a731d3159243a28a902df00a57681530e47933eee2397ed2681730a4fcaaceaef3cd468f5e644a534ca4077475ebb08d7558cdbc1e60f9dd9731351e1f6e4816b284494119fcb0990e70ae3614853456da6187603fc514369d5d76ca27743ac5b535d805f472db236d2a48bb978a9d927953985b8281b3c66839487f83ed45646fd176c0a89901bf79b49d67159729d89220e64c4978c3e03ceccfeb4c7a239712d4d02b6751de61dfe880e7c46b133", 0xe9}, {&(0x7f0000000080)="a48949887101a46d44f27d1cb8536eabbe3d030539098299ec6441a693857b0351a2412f05eee023dcb4e8d855ea5a8c6fdcefb2c8c0e74e4056e4c4ef9a53d8157c078110c467303242a1bcfad0c51cf3a5782b1a5fb0dd02247f4ea0d1d09f2a1515242947", 0x66}, {&(0x7f0000000100)="53a831aa54de8340feb0", 0xa}, {&(0x7f00000002c0)="fbc81c4add948ab645b8a3d68361d082a1ce58cf0777664f2dd607446ccffdbb6ced0edc4d5178d9b0b4016908b9ce246d6ad498273b3a546b80909fe3d95ac62d795188f6a5a7f60e77711e5e64d30060c8abd1b90a8ffce2f034be6598b25dbebe90fedafee7af997ae53a3ea00826a9d1701d4d5750db98b741dae7c1c6865e0e219cbe08588c9fb81d1cf7d8", 0x8e}], 0x4, 0x6) keyctl$search(0xa, r0, &(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:08 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:09 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:09 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xee, 0x0, 0x2a, 0x6, 0x0, 0x5, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x1, @perf_config_ext={0x401, 0xfffffffffffff59d}, 0x8080, 0x100000001, 0x0, 0x8, 0x0, 0x2, 0x3, 0x0, 0xc, 0x0, 0x1a950b75}, r3, 0xd, r1, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:09 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x53670000}], 0x400000000000132, 0x4000000) [ 1050.359616][T21699] trusted_key: encrypted_key: insufficient parameters specified [ 1050.455169][T21699] trusted_key: encrypted_key: insufficient parameters specified 14:40:10 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:10 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:10 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000300)='\x00', 0xfffffffffffffffc) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r4 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r4, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) sendmsg$tipc(r4, &(0x7f00000001c0)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x42, 0x4}, 0x2}}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)="cfd24f6486ce9850d68a50ff2839645818715aed53cd64afbd", 0x19}], 0x1, &(0x7f0000000140)="81711ef37b8489d1aaa03b556ca2c7118f0b45a21cea72cbb3b68cacacc379e94f3d8fca5f74cd74d5ca5975957344fbf2f014a9784af355e74690337d4589f8049ceafc17f3e4524c2381658b9e144412c4c6ac5046f3cb6c9a4791", 0x5c, 0x4c0c4}, 0x40) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f00000007c0)={{r3}, "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"}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:10 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000004c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x3, 0x1c, 0x40, 0x7, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x4, @perf_config_ext={0x2, 0x2}, 0x8008, 0x8cab, 0x80, 0x4, 0xff, 0xb0bf, 0xe6, 0x0, 0x9, 0x0, 0x68}, r4, 0xd, r1, 0x2) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="a4dc781bbcd4ed57897853f16f681f264ad3c2810e51ddab22bddb3dac3cdaffab3b038fd270a122090e155caaa3430c2b7a6a5489b1f5dbc3fc0bb9c1e3baaca598ec99ca0cbe6213bd6958557cb505b906b07f849d15754977258d02b0d6f9da30b0efc55262afedb37bceda188ec110a3867491173e6a512897276acd397c0ea692b212bc168fe663cd61f948c2f8cf19fbba994fdc329c2b6ecdc5a5e5ea9c40cbf2e5f42a7b151ce9777dbe623ce26c92b9cd9afb1e5ac559a4f9f8f556ca882fec7e265d6d4f12c85d54afd35c", 0xd0}, {&(0x7f0000000180)="d77987326ecea767ab963021030f66561d2f31ff530ebeb2b4867fb53bb7722465756b50cfb6c5427e0dec6e1d1e908cdf980955d7de0839bdd98552db9190dea71d23358d4373186843", 0x4a}, {&(0x7f0000000200)="7cdbec08bd99a4cc33070300000000000000626374dc3d4a240d0bd4acfde95594313c2de8ccc487e2d89769e7911d24b98e4172585961b7cbafcbbd8be181457f307aaf79086c556d01ea7d92e96c57cd170526efe08bea6d26464ade288266c306cb6b7fd03f008117682672fbbb90256704b169599e5baa70629085", 0xfffffffffffffe04}], 0x3, 0x0, 0x0, 0x8080}, 0x1) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) add_key(&(0x7f0000000540)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)="6cd6b05b6561448078f9095d36736b234d5c9e2b8b8e4b62e8ba3107d2b6fd5360161f96ae2d50e81f12848f6220dbf168e077d4882fd3955d1e8226746e5189d1bbb9e3cfd3798ecf4758be11", 0x4d, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f00000002c0)='s', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000003c0)={0x0, r6}, &(0x7f0000002000)=""/4096, 0x1000, 0x0) r7 = request_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)=']:*^*@:-[\x1c\')+%{(\x00', r0) lseek(0xffffffffffffffff, 0xbb6, 0x0) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x80000001) perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x4, 0xfb, 0x6, 0x8, 0x0, 0xfffffffffffffffd, 0x661c, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4ba3, 0x1, @perf_config_ext={0x401, 0x100}, 0x40c24, 0x1ff, 0x3, 0x0, 0x8, 0x3bff, 0xa7, 0x0, 0x9, 0x0, 0x7}, r4, 0xd, r8, 0x8) keyctl$instantiate_iov(0x14, r6, &(0x7f0000000340)=[{&(0x7f0000000300)="9d4972955d3ed189475c90411f383b4ef0226db9a34a82786bbc6e733e46d7ad16", 0x21}], 0x1, r7) 14:40:10 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:10 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x5b4b0000}], 0x400000000000132, 0x4000000) 14:40:10 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41100, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x1, 0x3f, 0x81, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x9}, 0x8040, 0x1, 0xf6, 0x9, 0x7, 0x3, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r1, 0x2) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r2) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r3, &(0x7f0000000400)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x3}}, 0x10) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="9c29f6aaa752195e5d6ecaa3c30ca4ce787fe48da5ca603840c5cde1b22c1e5590e18293298d85816f3e36f8286322fc844f331547a8d705403dea3847d00827641db5d1522472d0a6b909584f148ef814769caf684b2d6b28b432c1c911f3ac2b55cdd1699b64d2a18f0cbd8b1f2f45ed0bf4decd557a9060fbbad2d225bc3e26c451fabc27b604e1ad477b26efcf", 0x8f, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r4) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r4) 14:40:10 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:10 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x60000000}], 0x400000000000132, 0x4000000) [ 1052.005825][T21745] trusted_key: encrypted_key: insufficient parameters specified [ 1052.072291][T21745] trusted_key: encrypted_key: insufficient parameters specified 14:40:11 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 1052.170025][T21749] trusted_key: encrypted_key: insufficient parameters specified [ 1052.230207][T21745] trusted_key: encrypted_key: insufficient parameters specified 14:40:11 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:11 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='keyring\x00', r0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000000c0)={0x13, "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"}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:11 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x5dbd142c3f1e6049, 0x80, 0xe, 0xff, 0x0, 0x0, 0x0, 0xd602, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0, 0x4}, 0x80, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r1) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:11 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:11 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x632f0000}], 0x400000000000132, 0x4000000) 14:40:11 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x0, 0x2}, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:11 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:11 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='\x00', 0x6da, 0x9, &(0x7f0000000640)=[{&(0x7f0000000080)="c243d08d72f65a3e2017b56183c032519174d13f5251645a44c54793dae12b0f471bd1f1fb20a23ea1a9a88d59c5f451649ba1b867844e37dac85acd4cf0834bb375ee54ada567d15f805ca36abc3e54e86d2f49f4207f7782c04316d1cfc3bdc8975de30949750723b4de68663d9e4fd77005cecf6ec3928d01bae49663471e42576d79fdbc0b9587264a0dc4d4c95553efff61a87e040f3f4a8dae1c48a07f61e2420d2c55f73f9cfca3b8db17e4cef62a0bab87bca07377496111017014027a7987f660b3087e125bca0f8440cf5a929f96bb", 0xd4, 0x31}, {&(0x7f0000000180)="77d44c5b", 0x4, 0x994}, {&(0x7f00000001c0)="89c0c12e619bc32d9a94d9d443a3c63ba3f1b402b642ed0a4167ba4b292952a8c3d47340183ddb8a48b365e0acabbf107f069abce9f7d6b734a665ef4efdbb7c79a8128ab95bb393d598338c04f41b325e081cd06c0ad46d0f0c5ae311870a6a347e9300f7b30071cc1c137bb6697dc85d6712b7b822b98a1e2661505a1001cdc01059d864fe028ee25f92a093eea2a5daba324c017b9f016870c823b5b890cef5274977aca0648c0f4bdf5ccc3a17b2f448500f2dc9b2e1a3c2ad36d5a163c67c493cff07625b1263eaa4a2b638c52591f723a3170e0b", 0xd7, 0x2}, {&(0x7f00000002c0)="768ff5fb526a7a4fa462822e9b292722558f4d2ed8bde1e6522315f217cc971e88a2eea780560bb4778ac626a107bb14bd5850d5301efbc2c85738af1a6e7037214f4df04d177c11df1d522a1ee276ed601e58eab84dca2eb0d9e30ecaad257388e50c14dd2b5da9202a037c9916ed700ecaef6cbc1e807bcee3e93faac9b373c88ba465b0462c403e96ea147cf06783ad9fb510525644c8417267265b33936b", 0xa0, 0x800}, {&(0x7f0000000380)="0cdb8380a615a1a3dcafec20a0f336effeae849d344a3b7cfb6bcf0b97e8a3340686b7a8a2ec1085dcbf7873fded9bf41131771d3fdd29dd816f339d387c5d13a60222392ff619b83496400704976446655cd8f1c85794a12b622f47fa141cddda0d", 0x62, 0x2}, {&(0x7f0000000400)="f23c1994c2e7c8a11f8ec322", 0xc, 0xfffffffffffffc01}, {&(0x7f0000000440)="47fba11902571624cca4ea8e27e2384dc1a4dfbe653e035fcc996f34a42748066d4f14d92391b8d24823bf62f2c89104083fd05ba8313d40fde55e27444bec60e98711e142f993c7f03ae984e82a86d4c89734b9ba39517248978ab19a1eba43a86978c314ed6c7aae6b7d58676789194b7ffea55fa51aba2b707329516b931f528926cc0707de527c4a07244da19b014097b24173cea3d01e1c84c176dafba7c9c596e110a228656eda03879f77a1bd104412e19ab92af67bba5b52796bb0ed0cc12e44f2d3a85af23ae882ea555b36e731cc6372943ff8e77945ef186c039a", 0xe0, 0x1}, {&(0x7f0000000540)="f93a7be6957c4876b31e454bd6d59b39982e79343cb4c5352673d8edfeeb905d67242563b426b1f65fc2eabd4f4fd8f879ea49ee278e2e449460258f83601b77c9845d9092d8bb3654a65ba307dfc8322e623d1e12cc6d1735668b6e6b84cf5492cf4b1337e525313f84fe7a29aed9171b6adfe26adaf3defe5e8fbed6c0754d0eca986dbbcf95e0829be018923185248ecafb5bca70e47968369eaa1d87d6937bd8845a2c761b9943f93698f07a2c7b6738895ee550", 0xb6, 0xffffffff00000001}, {&(0x7f0000000600)="b29b0e8841e0f655ca8bb30440abc416f0f11340b4ceccb8df54fb588ed2023dd89531cbaea8bd33f25f73e78978863f735c7ccba12615dfbe42c2b44c0a", 0x3e, 0x2}], 0x1000010, &(0x7f00000007c0)={[{'syz'}, {'syz'}, {}, {'{,'}, {}], [{@subj_user={'subj_user', 0x3d, ':{'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'keyring\x00'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, '\\'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!,'}}]}) dup2(r2, r1) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:11 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 1052.922698][T21774] loop5: detected capacity change from 0 to 147456 14:40:11 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) pwritev(r1, &(0x7f00000004c0)=[{&(0x7f0000000080)="47c6834021ff379231d3dc2c078a44a97410ad5d2b2b0df62f83316455d7f969fb87c56e5d6a16fb3ad6890e9e60ea8a18de905d10745db6bd8d8699678d071e4aea27d34de9ff0c3dcd4b8880dcc5ecb31c1dc3ae", 0x55}, {&(0x7f0000000100)="e944c27ea2fee79dca785db009b31891feb6c0f1b5b612d52ca9646db7e1760a430ab3f9be068ddc01995df7bdb19dfc0aa43c5ea444dfdf1a34ad574e2c2cc3fe548d16fcaae5ab9102d2f5c33aa8db3abfb429641bc13b6e9691e3645cf9be06d254326105717cc7a52fc25a9f2418d1ed1e2c356312073ebc7e531e98533e19a7db9ea830f468efdffb72daece6a5a1aa0461e2f0cd37ce86314847029354b2d63da7d9b56488c2cd69cee858698db21ca27269d4e360c79b8b4b75d73859a43303a53f2df19f2992dc506bc499f28304f1da8d7d3f56ca1fb1292e45175bf0b4d68df10f5a44da02609a488dbc81e934c8592ee92d", 0xf7}, {&(0x7f0000000200)="2a4424fee64c781f43881f4d4ff7af5422fc1ef1e5226dae0401c87f59d200ddf9c66948f1c0e6d72e86c9a0ebfccc7ad927e054156fdead7563d60afcbc342e44e0ee35e5f1f859fe2509a72467510c4b6b08cd249f54b03904cabc2bdd8853600135e6c34e", 0x66}, {&(0x7f0000000280)='\'', 0x1}, {&(0x7f00000007c0)="ee173b3f9d7e6eb3927933eb26cb70bffb6587725c7e0d9950cba23189636afaa143a1502d6e7c6b8578ac9ac8c0325ea882d8e246507dc66b596168eacaf4bfff0f81575393f8fdcaca329ba736bb60e9e750e891a6edfbf50a083c08b882784e4b8098e5c1e1b3f62c9575d9a4b3ba225b9143646752903cf68a0ddcbffb946103a1cd9d7f99d90f7414456af88a5058f14ddd2f20b3624f8ea9ab1d8e373e7510c0a74c445b91171f544c4b1363f6c4075db14e272be814a69f135ad8c2e9545ac64c57317f432c9770e5cce6b42b03db5dd7e99b3d0bd2fd6446ddf0dd2846a65c0192c9ee4223be43e17f01cf93d8846ecffa6889c40ee3162edc03b159f556e50369b54e77c204c7f6b6ddeb5ff1987ba9f77ff479f69c2c2caa2d594cc194c27f2f0e1c0aa4f40701d6ce424915d5f0f89f5a9a3f69d906c39773a6ddf0ab54cea681f959012a0d8acc058c302d95a065bbaf8cb6049d1e65fcada737288f16134231cb05cce22934726cca8ab60bc9d4b77d141fcc9e08331d0a981baa0257041e504ef731e6fbebefcc8d3363e835ea14a013ee8ce5b2bc1f1f5c1212265b1bc6878a41156c301c15f2729806109b0c1c247cb4354b23fa8b7804022056e4ad1d12c11e6b189779a0d71818b3740cef7a9d49db33e16dfdd7db40f905063bf71f7658bff407c5bd75c61e2765add1a12591b03aba4301cc01cc51c6432ca76bedec4eac31bce817f75b5c845ad24fac6db1a70e5e99334dc057c9e72c6b71a3894b956358a3118f02b4291581efd9a26d65f40d03fdf32d0b7df2aa9b22215c016c7e39931a130a8d539e8465430b56048c444760052c346357c97a4769d53ee32a621e2f378945306d6da29db001729250ca1bd06f13b397dd676ccd575cf64233e999987938d1f44f68419e82e49e559b17b950924fe5b5e38b8d42e53f887d0c9ddeb9be8159f2da8045f9630eedc2b3837f4b1da839d4976ac0e486a981cdfdd772e1cbc0fc9e3e32265eb19a48146fa3fd15f52573399c6c7a1c5541a96f1476584f4827d8f6612c99eb52e46b18d3d9a74e9db3e24cad05933725541de58122c8590f8f4cdf64c315cda0ddf59319d46252d1cf42f0b945b1de211fa6deedf5d4a5ce7fff337482cdc289435b3ec6566860bceaef7fe0dd6fbbddf06b6c5ca717cb46df732eda11cb2e09f21bc48a318d1daa49ef0e3fad93da4b46750c5204064c28fbe3124eb7bb12c312ccbed7a459bb5b63337389ba2e365f2f3181ae5a6e0fd870ea81da277c41bd50fc50dc7353739e3ccf449a2c59ecf3518a1f4ef518e45e1d1cea4113b922e34afb3809c3a27cd8237d079912a9d50f76501e8eb84f6175511ba69f2220ccad5a60ffe11da410eaffde06375add28b6b6b8996266d4e410e0153fc7d0cf625240554a8303023e020446f852733ebf466eaaf3a214ef137eb9c8d4be460ba4d2317142613657137d091bc4e367e36cb14efa085438407be94a701a09d2f925ea119a4327c828b513cc56db746d88d3fe8163d196864b6f267a60b59d07421c8c7e16fd1d96625bcd12e03f7fa055f7d574e0081236634905c2404b6ac4086629f7b427b36062a07f75bb3adb36e32783669c17533bfcfccdeb66e89c9f3b1d0f029d9775bb5e6c03057c687484c29f631a5169cf16076d87a9ca23e21e929cf74a55176395551e10938073b4bc5b23f8222e269b28f3d9051d54eb743baf59d68208a0e9a989be7528e9f80d0bef7828a49c94e97bb51d49bbf42d6f78f95f0d540b53b01cb76734f696f8cb5413b4a1dabd62e862bcc1bf5bf72079986ca1cd34315e7621600cbcb88e603f7f2a914d54ff6f1ad41823d479a859f70ac69506fa626aab524d36a15c830c8683ef4e669480afba7f1870dcebc2b8070e58dab8699936ab3ed4e82308c70ebb313e6871aa64981fe5f071ea1af24503956ef5d5cb07f9dc7589341947b2f9901ca32986d0d6a11c8706311f7ea930bda8f96d6adea4626ebb9cb9e7bc6b46c50c5b190d7b6ff93f8d87a44b763356793fb3cb917edfdc9a5d33b1b777b70ad176f9dde36d56a71c6ae17d1af4a5cf2a6fce1e36c4e006caf4e34f3c3991dea5a2720f880803b7fb58b9612f60aac31f8a4dadc825f579083cef535a19ff8f5ac864edb098735949c900168450e0d80c8577f6ff9d13c7268ade94e53d629032226e7c181e53bf16c683d55ed75e2d825f4bd8ecae53e18cbee40222b280e0b4d4337c4cbe93c5d180365e17b69c4bdc55e5418ebcdf04b2bcbd1a7522e4152b46cd9f49625c3b4b9b5253a2ebdd8555c6d5119ae2edc5ce77f86d7b05ded5ade7022043d0d45c321df0727e8962bccc89418e3b2013fd69453d1afd765a1e9d467cf7eecdb03be9b92bc2334771094e0829e79823788c8fa1e854b72cb6b3f7ce3789407187f213fda63973f7c321cedadc22d5979409087e0b60f3d62f80050e965284d2dc3441c7f1b03aa2212d7de1c08211259f797259c4bc66abc81e48e129b0c71a8ec58f0faa77fc243ce2aeec655c3705afd7ef9ee711a905c4949467a96f192dc3aeef1963e4b23928d7cce27b44fe21be3d699f84f8fe48d06c3872d8747d88433c5d42db2ebe17dff058ae3440d1571243e288e76a54adae689ff00a871c4c1fc7666f7e7d766c435dae98e79bd37ac0d35daba70e0b304c1c057f58236699520799e79acde7245fd6df737c081aa63a80ae7f5391cf0295e83fbbd8a822bbcfce7c82b61906c02e622cf520346188045c7abda24ecafa562d3a8c709a92fcbb98727f12d36ea971b94966c40c54486b64679c31c08126f1533d710463f3ab38b1910fb02bdf9d06ed28ff7b013129344bf0dd80d86ca5e9e639d8fbcdfe811fde06fafe10339a02415efcadba2ea6f72822c3c061eeb42f0e58a7c948c98dadcb41d01c02064ed4ef046285df34f9348ea2d369a01d4318ce793ef1034c02d8b9952201b458a90bf0f78520a09972024b794d953547bda63ab9bd9be5d844b15b0ce29f6cbb3585baee16e709242f134651450363bad9fd767f1c1500b9273ad799e08106e66a5dce7c515845d1b97bdec57eeabd7f670414aa12f0c9c7ae6c0b00e4de6a476c4d723e25fc676501c0828b3a9d2b3cead65aa8f9956a97bec44ff7cc10443aa880abf3109e0a7d7fc28a0f6bed8ed94d7f1ea04b8608dc29a49d81570fb049e3e2bddd7fff3f8307a8a2f6ce29aea139bba433a5f76acfe2651e041b9fb420deaf37ef62c093f1770eae7fef4eb53ce94efa109585ed2cb6990b26c8fd3459b1d6fee835c99edf5e97b54a4c3010d835cfdafd9bb509b1102e75559384a4433f7195af3ac10329ec7b4b135adf685f20c854d12035e8bb2837925a23c4925a849f54261e19d2eb881ba0faf4f448717fca192197860037e7dd0360b429b69de3b0ca58fa6114227864a3771ed9804eb6d7964154c6d5ce15f6d821a0ada8d45e585cc2df53c121daf14f94e84f3218f6d5ed6249ac18b385c927f109b813987f4784f3909569e4589121fb9fda1c7586c5862b4c3304a4cf875c71aa38d4b239235e921d54a1af16a9521cd5e9deb2dfcc2279b62722fb53d52524ace72f6ed09be79a54d958f3d43edfdba76a6aaf760be9c45ffd5390ad0f802e92c2bd5faea39760d4a1da35971a00a857887e5a4a05146fec98bd4a180f28c4fb7710addf22f8da799de633e65c1e53d56cf14a2c25ab6eaa07bf8448ca8245116b1202626226517fdb648fb25059561b85b2468992f8fbf066e26098545d7117f6fa97466fce7ca776bafa6c7580d6c95447fab5b12a0949fead16fa32fac579d332295aa7ce1c61f56047d0616f25b7d6f4667a98111a5dc42c06d236fe3233540b689eb0c3044a53d148c7cb1a6cf56d72ec96f6c7a008904e901f2f2b027ca5c187d35541d7839105be1fae4cdb5b67b73cb64dce7183e61b4f1c22a936fa40314b00520a48751d8d24bbd56060c2d8241a442b44e12fbe7117b72436aceceba4132f21fff9636a7ad352381eeb1b209c0adecd43e2e7dc7e03d9349b58b708d2613d08e3936f2b1bc4f2ba05f6eea9194a6883559dd1e46cc89804603af3898cd0f964140e2f3ef93692f74a7194c7a7fb505c72bcd66c071a28be7722534fde641d877a2dc58f4641f74d9faaa227ce3066216c6a31b128cb28e2cb135b6d97866c4a6164ca4c279992464554a4e13253f1af79ef5249b0887f62bc93e949307806cebf2f3330afb5227330f2267cc68a32b8d25b8a4a8bb825ca2cce96ac0a569c604ec1011cb2c6f5c2a74adbfdf4785e6996959d59601ab5f8cfed88043c1694130fadc54508f5416bb791862d582720edb554f58ed112ede2c66a18d570a462c91ed47698a3c9a9d91fd58608602bd8b64d4c2d680f4a5aafaac824f0d2d52e3d5f6136898c94ad2b51704196bbb22d608199bb92276f9918dfb1de1e18e9e5501da97729d7400778e007a45e3802dce328740b83cea7451326dc345126569ee7bc475db1a29f352866ceabd1aa296931f767c582d95e501f129a21b2d5ae525efbe60718e40e274735a07f4cb7c4ac17b90b6c8ad07064148c57c0b7e395b51800f8cab7d963d9d8b8d7199c90ba0afecaaf95169047097fe448e921130cfa013479d24544f72ea5a1f523dda7bf07c76997bfaf33adf9ef88201d0d264e1f2c86f88afda1307c241d86c47c6ab7afa52d6d72f14bdb2c409debe69195f7d7e3f1ffa7c6d698de074fbcd78bc1069a296a2764c528c2f9d4db9c7b488f3480198dd1de32262ef8a78a0530db2c8822fdaee24852d8a8b756624bb073e1bc0438a8f7b748b6e244fa78a18902385c152a314c67e8408f643d24ccf349716824dcdd8cdf855621df64ff42fdd05c0423e2caa424dbb57cd3d0811dd77d33e7314dc46693e146cb18551600433bfc3e31a7fcccca74e07d138881292a0c1cb028c125e94966c06368ae85201e68b334f128d4d665d2d2012150fa0b27f800ad41852b8f3edb578795a9298670b851792d666b662afa116dd9f9b9fc63ba63130a682b34e4e749c5f43e442d01506118fe981bd8423b86209338b807d0f4f570866ed4609d21a76d4e5c32c367ac1cc8afaa3f7c49327ffc630ad6e568e1e15e67e8ea6c44178c1d84a01fb79970c0ee9d17af2b2a3e4ddb27c895120a6df1c09c32ab742850481a136fe8e879099a02a9b98c9d86895ba4c50b649077faa79a2633fea8e50ab1ea688413abd454744a1e72280af4eecfb1d18a2d2332cfa58a418244012db07062a82441c3b4922f6147b2e77ff9ba50dfe3f807f51e5b25e28e4f5173f6a2b5e7f6f3902588630ff8935136306c180d06778e8bba7244be521cae6f32880771072a871fa6ddd1216ade39edf011173aa7a7a8434b394566a3d8294d727e0f0939b40f9a39481b7f102bc37497beb558aed9809504e4e5e51630fe90e68f1b9e5ff94c0fd1a361ae006f501e6a772e69b0ec33a51ce57ab916c9e42411c28e29ada20400f9c20fa0e925d180aa1c77c5850d0cc03cc4c0bfdf1a24103a28cc6fc900444f598f7424a065c99f1d66732b745ab05acf7a0f0072e59bb833645c213aac14c83b1b380141c3905b626d0dcdaabe43208ef36488f564ac43073d1a1dc8595b905efe5e58c787f0658c53055828b90a70f136964e3499efaa9fc8af9d95da5c9a91f857b83a0cc09cb95c36311a241bbf846ffacc34d470dd15b6c33aed6b76d1888ace49e135e752930e3d", 0x1000}, {&(0x7f00000002c0)="aba5f62310b852b7a3a081d258e353fdbea887863584984bd4f518e65f8d1cc23538c54665cba7d150adbefe7f18c15c5fa1b36c971ad63f05d5f5b9621cc0aff45836caa40ff0859ae05c46ceb6ff5a16ba15d436f4e77d344b4e0bd4fc03a75c0163b42622ab5251056492653cb9c35139c28c26d8bd7736fc5275aeed0201b94c1f4e84e5ab0f3a293d3f0de17ad18d73c17b96d7b01c24180266e359854582f9301dfd97682aaefc9f7af92b514bddfab9ffb452260d13d76e468af64491ee6e9acbf01ef5f932658edd9c206b97a2f3eafbd098f8ed", 0xd8}, {&(0x7f00000003c0)="28245462a13eec118b9ff1df6e0a6881c40e20999e37c694d9e444eba6fd7bd10386740b77999a03582f588b6479e87f", 0x30}, {&(0x7f0000000400)="2b69196e59895371ff059f23993b2238c74b04b3c7e3ac1712e79d48ebba9b46830f525bc128555d5ff8078119d70b86904fe71913f82aea3684ae375dfd2a694647ce9a3508eb0fee29738bf27481765ea79e61f45b3bdacd10caa7c95e150db01241964a7f33374d6fc6e8c419eb13163a59551ea8723d09bb081c8c6e140ee64f118af080fd8454fb2da5a16ba8beceae76a9593c35aca0954036db918f", 0x9f}], 0x8, 0x4, 0x1) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000580), &(0x7f00000005c0)=0x40) 14:40:11 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) [ 1053.063954][T21781] loop5: detected capacity change from 0 to 147456 14:40:12 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x36, 0x66, 0x35, 0x0, 0x34, 0x32, 0x35, 0x34, 0x35, 0x33, 0x64, 0x34, 0x39, 0x38, 0x30, 0xe]}, &(0x7f0000000080)={0x0, "77637c82cb0b18dbea0df46ca2220d470fd77f135360fdcd85a9d2874925bf235f9a39fd330376182e183fc45c6f6ca71b57e6045f52a1b834ecbc6948095a1c", 0x2e}, 0x48, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) [ 1053.618940][ T1357] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.625583][ T1357] ieee802154 phy1 wpan1: encryption failed: -22 14:40:12 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:12 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) r1 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x50b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a889, 0xfffffffffffffffe, 0x0, 0x0, 0x9e9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$tipc(0x1e, 0x0, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r3, 0xbb6, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, @in_args={0x2}}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xf5, 0x1c, 0x80, 0x7, 0x0, 0x16, 0x4004, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4013c33d, 0x4, @perf_config_ext={0xfffffffffffffffc, 0x80000000}, 0x8000, 0x7, 0x80000000, 0x2, 0x1ff, 0x74ec, 0x8, 0x0, 0x6, 0x0, 0x1000000}, 0x0, 0x5, r0, 0x5) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) 14:40:12 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x6b130000}], 0x400000000000132, 0x4000000) 14:40:12 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:12 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x7}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:13 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:13 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x20, 0x2, 0x7, 0x2}}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:13 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2a, 0x1, 0xff, 0x1f, 0x0, 0xffff, 0x80002, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffa, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x24010, 0x515, 0x101, 0x6, 0x9, 0x20, 0x9, 0x0, 0x20, 0x0, 0xffffffffffffffd9}, 0x0, 0xc, r1, 0x1) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:13 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:13 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x3}, 0x5800b, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000000c0)={0x41}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1f, 0xff, 0x2, 0x64, 0x0, 0x10000, 0x2208, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0xa13, 0x1}, 0x1300, 0x1, 0x5, 0x8, 0x73, 0x4, 0x1, 0x0, 0x7f, 0x0, 0x40}, 0x0, 0x6, r1, 0x6742d0ea689bcc3e) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x2, 0x1}, 0x10) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:13 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)="76612d0bf7820f696cb9edd2d76e1b1332e3decdfbac6e0e30fcbe8f0dee83b20ef6e605fcb93cc1f108317e1d05574c750fa80a9fe4eba3d26c47a80bf2603b3f36c65209feb33f03dfdbe4c15c465dbfbcda264130bd289456972cfba43e246219e7d677fe287b76d1df9f0313084ed8a8bb2276a181c670980d583a4444d7c23b5c3de0587436b80e4870aef9e55cb36675d46daf3e2ebbc245e85c3a40e0a2f13662d34af47197dc8910854bd80802f918928fcc3ccfdc43824801f4a4036d26c51ed57af8b9855cea23b21422fd18eb", 0xd2}, {&(0x7f0000000300)="568f4afb0d96eaa29ebddbdb6bc8c98d4ccb27933e2bf545a233df8925138212507227a61c8637a451b891f8f35403b562faa4f9bde9da57e993a46b642c61cfe5fade4e19f48322378784d56cc87ae6bcd9d4af369b2a2251a2e29511d7d19e5540b983490c23722ce4f5879c177af250602e01bd935d8bf6618cad263396b314a0c9b71c49bf228069a66d111e20152acfbb9c6c287f12ab1ae571a03495a24325d4137747315cc117c0fd71f9a4631ec312b57a1f9d3ea3aee8005f80b1a50515911e04dd20221f97cec5c46108a1a0de625c4428a6b4193cfd8dc0a6d07db76b4d334de8aa31d3db9250", 0xec}, {&(0x7f0000000240)="20855aef041a75042744728c5cee6c8875c23398b89545ce28cede42fbf4986d9d9e670dfff565d96ac5ff7cf3930cc33ec808d186fea3b652897a29716bcaec63f86a185033c9908a", 0x49}], 0x3, 0xc) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:13 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x1a6}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:14 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:14 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x7}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:14 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x7ffffff7}], 0x400000000000132, 0x4000000) 14:40:14 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x80, 0x0, 0x6c, 0x3, 0x0, 0x0, 0x8000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0xc2c4, 0xde, 0x4, 0x3, 0x9, 0x4, 0x9c02, 0x0, 0x0, 0x0, 0x80000000}, r3, 0x3, r1, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) socket$tipc(0x1e, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:14 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r1) r2 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)='\x19\xfe\x82\xa7\xcc\r\xcf\xa9\x9aV\xc6\x13`\xa9U\x00\x8fq\x9f\xa2\x87\x98\xc9;\x1c\xab\\\xf4aR\x13\a\xc1RI\xfe(J\xc1\xe3\xffT\xd0k@\xc9\xe9\x8e\xc7\xb7\x8f\xda\x8b', r0) r3 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180), &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r3) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$search(0xa, r2, &(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, r3) add_key$user(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="42582ce42037e0b17f1fa20c6b1bc227c52c95de70999308b4918efa0e538faa2c25f5386de09fbeecfa5a7c34b4157306690205221660941b9ce115877f3cdfa090cd7a60c5ab86e28d37e53132d2b352f982106351bb7ceb837b1db29ddf9094c867dc2965d05fd782044eac64925b2f1003f09afbc6a389d41e8ab08004a6bc51ab0d89c369a465ea509d2e487509264fe34f5f2e24233e4c446114221262bcbe2e08573a994534fab9d82961b64e300e9bf0d1255a722fd40b23010da1fe82b3d06d2df13db486b77e3017075ca29c54ec9583844708136acf", 0xdb, r3) add_key$fscrypt_provisioning(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)={0x0, 0x0, @a}, 0x48, r1) request_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:14 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x40, 0x0, 0x80, 0x0, 0x6, 0x200, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0xfffffffffffff001, 0x1}, 0x2, 0xfffffffffffffff7, 0x3, 0xc7686562a419eb60, 0xac, 0x40, 0xffff, 0x0, 0x9, 0x0, 0x5}, r1, 0xb, r3, 0x8f871fe9e41de5f8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x4, &(0x7f0000003d40), &(0x7f0000003d80)=0x4) r5 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) preadv2(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/255, 0xff}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/109, 0x6d}], 0x3, 0x9, 0x9, 0x18) [ 1055.619394][T21862] trusted_key: encrypted_key: insufficient parameters specified 14:40:14 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) [ 1055.703215][T21862] trusted_key: encrypted_key: insufficient parameters specified 14:40:14 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x300}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:14 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:14 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) keyctl$get_persistent(0x16, r1, 0x0) r2 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f6d00f2ed44274c2fb5c8e79b7837331d3acc11e6ffbc1db66e9d1c597b156560ef8d541c9e995bb8a1944c07f481739f8d95c3b4ba3b3ab89e37e716aa69051fbbb527c35ae3745f2df3f4377b30021c75650ffe114f3cc4ad74a1b51ca2a142412e0de79f259ffbcfda17af93698040f20fca25e359f2a7552648f8800211c4828d02e78a1e4129546f9d69923f6800f", 0x91, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x50b, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x43000, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r2, 0xfffffffffffffffb) 14:40:14 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x83720000}], 0x400000000000132, 0x4000000) 14:40:14 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x12c}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x32, 0x0, 0x50b, 0x1000, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x20000, 0x0, 0x8000000, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, 0x0, 0xfffffffffffffffb) r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x40000000) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000003c0)={0x40}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380), 0x393100, 0x0) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="1434e325bf6dd9099e6bcfbdc5491ec4894a591172fb4d62bd59077dc2103fed5ffd875ce88dc355bf49037325c30877733b7751e6401d95e6a54789620c2b6804f406aafdc0f4cce811a5571ed60670bafbe0a7c2858c3da2c70af9c19a2c1d8f6ae388d7c8a28758bcc5732e7d9e0136c4689d319d58bf6f8205b3bff67a78ae3aed0a498a7b2768dcd366c028c280cfb5403605e79b1cc3e3069a0231372b3581b9a001e79e69f37d08b502230a68450a3ed9c38e2669795e825926d2", 0xbe}, {&(0x7f0000000140)="19e87c527e88d831f6d9db062432cc277179ba06a7b645a0a8d6c4b18b4aaa6ebd16310fb99d62563cb3673b9a6d162819db13af323e97d8cf8f1b0cb270bdc029af37ba189c7902e164bb6bb398cc464d5712627fe45e6a0bda929ab8be750467ed3cd7244a5f0cb23731b83fded535329a6cca295099f2c78a378cd41e1113c72509dba670726471d14998ceb1dc6685db5aae204fa64849e9123eef1ed68bc4476a110270f4fd3a5a397affd75dfa2dcfe111", 0xb4}], 0x2, &(0x7f0000000240)="ea9cbf2e7f2838", 0x7, 0x10}, 0x4000000) r2 = syz_open_dev$audion(&(0x7f00000002c0), 0x80000001, 0x101) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x40, 0x2, 0x1}, 0x10) 14:40:15 executing program 3: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), 0x4) getsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:15 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:15 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x8b560000}], 0x400000000000132, 0x4000000) 14:40:15 executing program 3: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x3, 0x1}, 0x10) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000100)={0x2}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:15 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x500}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:15 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) 14:40:15 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x300}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:15 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x103080, 0x0) setsockopt$inet_buf(r2, 0x0, 0x28, &(0x7f0000000040)="9082ef880b7a29b486943913471632d1699c449f8dd77e62106ff77b9e62d25a635f57babbe9603bdc5007bf50af60e4f371c201642a77983b946172b2d1a839b8d9cabd1da6b67a1bab086d64005e302990fa37c76aaff35ffa9a586ca31a66a7236a6964868107b0a275d35bc9c92273c3c4b2b0d58bba329059d991ab18bf81632f43183c24287a788801d24c277476fb52cfbe2ffb16ac8341a65e0685645030da085438c5b4ce75c2167fa2fbaa2c449d2362b20fbd353ae1996fd3bd9798fbc8f03bc03c94e39c2d61f4252c6f3cce", 0xd2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:16 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:16 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000027c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = getpid() sched_setattr(r4, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x2000000}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:16 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180), &(0x7f0000000100), 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000000)={'syz', 0x2}, r1) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$negate(0xd, 0x0, 0x7, r0) r3 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r4, &(0x7f00000002c0)={'#! ', './file0', [{}, {0x20, ']'}, {0x20, '\xcc[\x00'}, {0x20, 'syz'}, {0x20, 'ceph\x00'}], 0xa, "47d3a4770517e5d0b0dbf65ae715b8f9e938fede0b81d0a1c9739dcd808f9c7db76cf710eda329b423b623574560cf76e943eddf11675c5bfb0f54df66d76e0c2c6fec6f7050b7d5ae545e690e71376de38b3a6549f25281e2335062661be3af0e38de"}, 0x7f) r5 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r3, 0xfffffffffffffffb) 14:40:16 executing program 2: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:16 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:16 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x8dffffff}], 0x400000000000132, 0x4000000) 14:40:16 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x700}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:16 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r4 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r4, 0xbb6, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000001) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x81, 0x0, 0x6, 0x0, 0x0, 0x8, 0xd, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd1, 0x2, @perf_bp={&(0x7f0000000100)}, 0xc8, 0x699f, 0x1, 0x9, 0x765, 0x92b5, 0x4, 0x0, 0xffff, 0x0, 0x8}, r5, 0xd, r1, 0xc) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f00000027c0)="9b0ca55941c63f3b42621ce97d35f8f470b2179af1efa61d622f69191fd3182831b2fa4d567e651d0ece1077d98dae176bf7f98b75fda07b3755143fccda924616d04974baf30241e4fe214357c7b4ec91b17bfac3757c53e4e1c2c76e3d2559594b202ccfa8335af21f0f8cfec1d28b886ceb5332bba55c314bdb88d86c8128d74c05ade15c41e96cd783f53b730ac1c864e0cfa19c2d835981128916914fefef77ae483c347a283783442a56aa5c89b20b5f9688e779db95e619e1e3fab8f0a8e3435725f36b7ec1ff60618c248e898695d84efd373a6f11a2d2412077d5af278fefe22eb3eaa4bfd169a40c409141df714fbb5444526b9929c5e4bb9d78260ad1b451b7f7ae061ec6be58e7f110b2b59c8eac205f68a9ce3696d834928e24c84c6d2855138754116aa843519a7f0fbf135594110444b8628ec730840d4fd1eeada06aef4ea8cc71e1e9f2ba756230a6176255fd3f06f7230b20383b1c00b32d134f82261972a4ad72fd1eaf9aeb7e38ea405e401f38f18b97ed6a710bff2251527f278905cca90a7c749fe7fa94010987f08c12b180d17fc2fd0720a7a804ef22bc7d77b7a54e5779a632bcbd0a11fc6a8d98ed52e5dc52b82a9f809c4ce426411540c1fe7896b09c4094be2b7d4cb553d33c9908e9b5fa19625748c39c575e078fa41cd4e196701cde8bd2b3db1c82cc07f5f913839a80b62b50b9c4397b7ade4f5b3c24e61cdf36f64673571b309302e2a2f4e0abd1bc411e03b9b667faf5a37b9f137dbb64b82215fcafa29fbb93b5bbde780de935a86fd3b7b48807639afa799e87638627ebb3f12e4c68bc5d09cddbbb7b9d6532b4b5cd27ff35a9fd3d4b71a41c3d7a495940f49e6d3410706545ae4071cd36d4d4168b1cf2c8c21c31323796dca53d47bf9b0ec7f81f236b1a4addf524298004ff1fbb41797a41abd252fcaa7f15f365d0a00654ced4933ab66a1d80f2f40a892f19401470e116645d1d975d4121acd8fb624429605228d550119447fc675ba9e18b2418013f535599ba01b598dbf1568c7d0f9eca538564bc3ed7314049573a1883a6f41d21a3cb9430144429733bbb1ec4e182fa154eeb86da75d842b5007b02f917da402b47c313d6590795605f6dd11ca2aa284740ed90cdf179d74eedcd078b6435748451c74a8398ea9263b1a9061113dff746cae7d4eab5cde3dacf1f50b198accbc48fc62fbe1f92b229a383f8720eb5180fe75f9accf8920385e6497fef182930fc58d9bdd36d0354f821473f7d5addb672d7813086c7489b215da0d587cc93d447f01218bbb4cd44cdf5f2e5e81276b7dbabe7c335a8fae9860c1670f1d94271ce88c14e05ec439a6599b8fc2d38f0af5b604f4e9e7bd77d7912376fe9cdb53560757927d0391d4dc8116526562a0c1396415ddd8946146619ad71198a842f457357748779bb4fe9e597afb4beb562b22833a03521c902970f4f8e734964611f46fa742d9c1a37d6bb4cb018438dd605be78fd17e712f2107f1559873474eb6ec59f9ef520720d4eb9e55de9e51637e94fa1d493527992fe16fe32603262cda431c144c52445f1f2c9f6ae5647f70b04e7f522c9126014735efb5fc51776c76b7f0adc02156b0c10bee99e6b95ecc8cbd0b7ec8f79b2e6113d2ecab612340f66bed6727baa254eac21494953c6b618fc90a5fae0f3772f6aa9ffaaa8b30f11ab60d9e83334d9c43764d06557658f4676823eee07fc465e10d0396dce88492bb8727892818635587cbac0d2d37eb0c6d558cb90c304c65e46cecc1085e297a486554114b0d933c629597e7d121fdf5304d9ae0edfa4faae43f46fc7c9f5d32644c98c91bdcd7f0a2443e74bf1b772c5b3471b4a86c1e3179e32652e3b3c5c8e16581411b7199caace02d6a2d796d23e3ef3295cddcd52b357a5f4fde090da33588d1a3505a896a30639d11cf641b45ce3f31d481f3bfc88a7f244f9a76e2138374baa08f82219f674d3cbcc7c68c29f0fab6d9baaf48f435bfd8bf029d0ca604c1d9802702863444ac3e735dbcaf22c5531a5aa5d317808297c4199fbec7382dc8c57d5b8ff862a590e2df81db668282192c073b42bc6dc491dad50556f8ec042cf5cfcc175ff9b56321879ea2865009e90f3a91948ced07ada5b965a9f12840dc56be44b78d10a2c3cc0b2f997584e80313c044a58d31d4d3570ee6eeb6151218c9bfc14cce89414dcac6bf502e68281a518da2f38a5fc84367b5735be6da82529c1431bc0de31dfb0988b8466496f2458b6f19afd2d03c37b73ef2d5cc618b29668b1d6991c3b99ee55a8bb96f28c5b8c2d5057ceaa2db256c845665ba2d3a3dd674ae43a72d344f4a25c3c354527f6af48c2f00b152a758a2d5200f0543064af4a63bc1c02ddfc405b75d54007b4afeef12b54e9ba615a48f547673d98965e16756bcfa3226ad11f2a98e1f2f77769d1ae20e71913fa88546df210947ed4a72c6fc2892038d69b32bc19e541375990fabbec75745b11d885fccf8b1f38ccbe74036f533e977bf2c324af5d10b80f14b3c04bd8c3a83cb32ce6686509a903af5a1a7039231c0b811d9bc854fe31d7d4607ba2f85a2af9654e497af33f2d9ef4f9379a60649021b745094fd5e5844200f0b98448e11f25ffacc11d6e1c0ad0c4666d66cbcec4565d42f8860e0cafcaf260a44856d0485f2f08b61e9e8ebc3756e81dea1ed6d9cf7199a2b9fdd920561bbf28ee0cc7511006a922de9998c35c7f0ac000db8cb6e32c4b2d04e9d32f92248e0b28300ecf5983f03d3c05af736041ca23f6d4eb8dc19b2b64ec881c9a7b8a7b5e95a6cc2bca5d1618d206022a2fc314daa742000f88cd5421ea5bd2338e8015c719b7186393d42623e6e9b0a1847628fc2c15d9b8a5d4bfbad8997e4b8dfd641f60a0cb47c0f8335d1f9bd092949b6c88794a5eed014ae124041fcd31ca966fcdce9bff0066282f6df137e2be74a7315c3c17f8f5802b7dc734a3593fcb2fe8a250e22f350bfc13db63efe86a92086bd404fd1aec4c62bf5ebab5c76b8a02016ab7be9eeb118ccd316771705dd1578d5cb9143f645c3bdb74ab2184113edc6ec34d22c3d35d05edf1d7786a81457fdc0244afeaf831c19e35a644e308e8b535fb5bfd08907a5ea03b5a61afece1298d40e1c24c4a6948d899f8d2f73ccfed6e1a7bc57f193f176471cb472bef3d58f2c642cf18a06fbe007355074c2921de0cd6cbb2572b8513faa722dbaf03973dcb788336b9f560d32f9bf826f164517268545116d03a13eec90721153115a9a473d0ee03c33619e022cc3e129247fb66498c6f925e587556b8d434989da2d9f6053257eed3d69b98e54853326f3c4f6e621dd2b17309ce06284c5353db25fe403258f68f7aab27ce20c23974a7f77f45c8b6acc7a556a0784927c3c35eca1ae51c71a3dbdaa96d2f27968565a3473132d23054133e38c9aa855668ea4e230538130923b1b3e58ba20f3dc6bdfdad813538614a26cf10f8dd82bba4c34eb3cc4e229bc629c25fedbc57274966117ade41ced696b20aab7971fef738878f2f92b80a5938519e4e8bd9ba1d6ea467810bfd81e0d20a2029a619e0de0dedcba8a92b9f0cb158683a58d140ff90f60a42282649f3a89206127851106ba1a89a52a51b965e293ca391d63f53b68f3db0ad9f25020876ba2f8e9330f8f5d2403dc20a0f41f0ce70a2e726c978a32f07cb2c22eebe1fe96f5267abc2bccb3103d4f3b2776b8f32ab6a19dd8ec000e6d19e6923635f93f9c1d73aa35b2b3f5d09073c92ebce41010bb4a7a1819d4d4791f528618ab2ea0da3db41d29c9c18cd672317ee628f0f474c09bf644771b9f9c22a1a52eeda64eb53e6bfe19e7e732caf278fb5ed0a3d5e64121b72b73b3c716b2ed9b5ceb8da5a6515d3ebbbedbe98bac4e2d16c9d87ead51767e755e6aa18bc98cd0b017b587cfc25fc5478ca9196d825ad00e7ffc590bd0351ea444f8723f0f5b35ddf27fb0abae8e299f90d9b603fe2eb6bb6662bb5f4dc6f5a51eb093e99e56a3f14361124a856e2a93ab01efdba2dee0691eb45d78f5a9f4d94a34efd1f6a5ea017e60ca3269b27fb21709b7ede0a6369ed664155a365b33ada5eb5f1236726661bccbca503e67d07a795e11618e6470d96334d97bdf8f01ac6276952f05102a3dc773dd460642afe5955d2e5e433ce1f66bc09d9e17a77dab7e5ef4b3da37286518061c0ba55d7c58d94c40dd5e8295b8546d1f466ff0e8d0260b7e7d4a6a6d57ea4b70504bbb293bcdfff00cf3549bed23f5cb5350f8202135172243b01f615a39cf29b280ee1116cab4e9567df9e051f0a9e0930e1b09f64b5914e9386a6e339484aeb5fcefb2e6d00f34b72a4c201807bee24cc19d59ff020570271b9c12d3a8cfcdec09f56e159492391cdc877224a6d6f63c2f6e1bc63581ec2653c38eb8772be50f8b801b92d73b13cc8c7138a402397650b61f3f93b20019188203389b3e10ed45cb5de054b46ff5e8c750c42fd7af5f94894bcbc5a5d251fc6c6856d109ea908c64b8c2113bcfaaa8fb25c12e4cd46ad76488af476fc85d9b01056bcdd86a6792c482539968217f2203156eaf1e0b30d2ad33366858d7b96ab3f0b8cba184092cba0a369b842bec1ef103991a3c0a6c2baab5c3431092691f6f897d371bd4c009176e21f9f2c1eda4853f059a4b3e43fa4e873288326a510c082328de083f6f2f0efc34f1ed7e24176233c94ed76a7affd7a41b36aa9715e794c5a90ba5ad553399f04908cafb811c6548b2dcbc176d2f52787acc70362e0299bd3799da2e96b89bf4b5987f5eef7e7123d1feb4c027c5449a34508b596a2317c25f3b13b2d524deefaec06d7814173748ce9efdf9602b1cb0f2ff155849843f6b421790f9e9e4f2b3ef66d785ae04cb5cc165856763863669820c562b91914ed5373f9f1706d499e43ab65117b63e4137a43221fdb49dee08200974b743a5a479771b7ae86b6f3a8dbdafb67a4947cf34ca1c008affd8bbcbb69912294ae12f1b31509e0940726e4a9b68a03ef0bc4c418fd907b962d7a085099048f775c7dbbda42d905749e947cad00bc48337bf8e9ddb7d4b2785cf2ff7cc5b0d5bfb6e71cf8ba38a47bab6ab00efd936aaa4194c30b2cd017100a63bca218e1ffd3f413bd692fcabd5c9fe0d639f4581699c9bfc8a1f3843cac194d3a5eaf0f1944817d8ef576683637614a4f781045fc010847f47ea66ea060fa6b228dea0c5dd9f3fa34a1c675ebbd57a207ac687914e65260ba18fe8ee872619530e7a14e8b3ac01c85a1538817a66ef1641fc694769e82e12878949691567cce3c987fcb66a20384179d2e2431f338ffbde6ce4697a900af678995ebada8ce4baf65353821876b5a02605d3f6910764917ddcf268bcc23606f0498e34f8e0b4fb0d920b20fdc9f1c1b81f58437f5c376a041e61c1b81988dd4a6cb238d129f72c8e2338d38dedfba047697cf144544fd956935076e97aec721ae9b7bdf673557c7e43f06bafba03a2b967cea1d17a18145dc414400d91b4703160ee2aefc018854ffbd1afe27594cf15582767a2e9d0810897c86f25abaa4b922e3ec10e535dc8b03e3bab75a7a55a185390044f3999970b31a99c56ea04786626d87ecbeb27f29b4746cdbf410ee3434b5a07854fc20e08a6e973d8221d25aa58da08b93fab894a9287c2a18d0fe061b29cfc4e3a46bc8299e564da7167810008c0dbb33a4030eecd723cb2fecf6648802a4894bf7f989a6d2ad9301d3202619b9b3b6a273", 0x1000}], 0x1, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 14:40:16 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x500}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:16 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:16 executing program 2: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:17 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='keyring\x00', r0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='/}[\xac{%\x00', r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000180)="c13d0c9b471a18ddd9c181fe44b0713b0f3269a6d70ceec5c3ee765954a78af7eba3826c210b84faa5e0506b1ebcb92e429b130de4f91ddd06d86d19869b0722861c65bbf4b0bb2b6b05ef6f8e11f6c5266cf8410a58be2ec1a82720cf06d4da3b2e1703ef5f29be0033f3b8a889a0a56a00e07890cfbf851199e6a1b5ef879b24aa4eae4be4fea08ff836b8ad2d52607f6a909e11b5c11003796110d39f5f63cff537c32ccc9424f2b2c3e966d195650ffd0d148457005ffa75e0f40845d9e53777d58d843284eeb0", 0xc9}, {&(0x7f0000000280)="e42c4cd3236ee16fdd0fc0091d703a8a083f5d03a2a4c5a602965f01e6069246b3131e76c85e20f68ba6ce943c186b59b9279b275725a92cefb7e94f3642932af5e31405e417", 0x46}, {&(0x7f0000000300)}, {&(0x7f0000000340)="5fb0963e05d1d43e2dd485ccd8adac8c45584300d20cd0ed7c0d07e80762317ecbaf4db4a8f88203edff920c6eedda7a1628149d3d5267273a306325308e0fddf930b237566fc9187af57e04b4ccde029a868b4357e42e89f2b5f8e6d6800b93a11617b8c5f7573086ef5ae70a5c62f644eac2b6b1172785544f687e47d2a324967b4c5ade2936eb54fb5f3eea0ca30b95fd056bd873f6beab1cdd82df0cd5b65bb21ece820a3c8d04728565758de1e38ca0200a952de35a220be70ffef2", 0xbe}, {&(0x7f0000000400)="28a1a1ff7edd4935a0bde0cacf11aaf960be903678e9e2c57ad7b8cae5504c2d90551782615495cae9bbec817b6de866c899484b27a2414a5aa30c626694f0d80733d90ed667f9bfed42cb", 0x4b}, {&(0x7f0000000480)="b417a078f10ca33e1fc232a331c5d3d192e50c171aa6a4e827561c00eef485b92fdf3fad1ecf15cb7c43dee639be82b15bfcf5d8be1fe61b296447cbab3f496be89f7a2ff7e8c7abd84be39b5510a291a1f110e0e0ebe2db1a2d74221af25b7ab174f28236747f2599cb99", 0x6b}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000500)="afb36318429e5992a96eb7667a942072b7fc826c8a97b4bb9fdab244e5ea9f790623e5a8662a34d6cc775f1fa4474bebe97c8e91908abb1be5d662bc8b4b2c3f2be537c81fe04f67f4c6d0911ec571ce32ac275e61508f5989a55974a16c4f4f2919c6755023558e049172290695c7", 0x6f}, {&(0x7f0000000580)="f3903a21c619d83c02761199f6715c1c3588db07d5c0cdd238aab01507f2388001a760cb9b012d3e03fa93a49c710ae34a937ee71b8d39288a5cf885585d99d7c74a7714e09311be99265e84afaf0431b24f4fe07a6456dca2115ea5ac8014eed5a32a06d1ea941b91cddc63685e6f5f283f7710b543d11a01792211", 0x7c}], 0x9, &(0x7f00000006c0)="7b2f41a1847b980657e5ed0a458ed9a139b7dfc848ba004012fdb79a04f89529031e42715a6466a49dbf5550c655d8183338fbee2268613ea611b5060cc0b67fcec7588b172466b746658e1f3aa4be1ebe84fde5660d0294d5ba3f", 0x5b, 0x1}, 0x20000000) 14:40:17 executing program 2: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:17 executing program 5: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r0, 0xbb6, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x1, 0x80, 0x4c, 0x1, 0x6, 0x3f, 0x0, 0x7, 0x25600, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x400, 0x4}, 0x2200, 0x80000001, 0xfffffffe, 0x3, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200}) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:17 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x50200, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x6, 0x3, 0x8, 0x81, 0x0, 0x5, 0x1000, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x6}, 0x4100, 0xffff, 0xd4c3, 0x1, 0x7ff, 0x2, 0x2, 0x0, 0x1, 0x0, 0x800}, 0x0, 0xb, r2, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) accept4$tipc(r1, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10, 0x40800) 14:40:17 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x933a0000}], 0x400000000000132, 0x4000000) 14:40:17 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3f00}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:17 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x8440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:17 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv4_getrule={0x1c, 0x22, 0x200, 0x70bd2a, 0x25dfdbfc, {0x2, 0x10, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x6, 0x8}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4891) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x18000, 0x0) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f00000001c0)=@name={0x1e, 0x2, 0x2, {{0x42}, 0x1}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000200)="6c35455515678626df22e4f6b84b48c97a356c5f1f438f619292d1861f204a71d06f4befd218dd5fef3ddf19bc2e0646ff803bf383c6a7e0d72517a47b210054ba63b5795d4ac4cef1f012b69be39f1c9b9c01dc8a38d548cf7bcd58c88f84f9f5e3", 0x62}, {&(0x7f0000000280)="d967de6d279504ddd5dde06a79369bc625d52fa3816e0e775ca12f893e2a6adf3b0c545fdb850d2f9560609cfd093af8e4a9636b9603057dca24d02d6ae255c9a89d7bc610b4fac9facbb3edaf36ac1dd8dc562aa2958754f82ac03af745ba280ad454c3194da0010815cbc6b6a79bfdf790bcd278cedf90e4d84aae4ca4ab361f381abaa22e8646cd1f9468874efdb8fd78652d1abea8fa6a5edeaf6ca6ad84c85f9c08fadac675c133c08a377ce58845967e379d896a8c73be6793bc35bd7322b2451d304c63362d", 0xc9}], 0x2, &(0x7f00000003c0)="903dcaad15b048e307d736cc0e6aec2a0c9f67f97a7ccc7602a5b221a48a1261dd232a78e3318c58f388844d59711ae0024d5247049af3d149551353c5a6662913414c2d3b4f9ab6e01ab2efa941d8c449d59e5721e6c2fea877e01db386d248f1898b9a290693a69554fe6b3735dc88775ecf1e0043de85e77826070558db4803e82bcbdbaa3b6d9d965e808c1696e8f44d98b4a5bf4e2bb32d10c8bc163fc67169c2961619", 0xa6, 0x800}, 0x20000000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:17 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x700}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:17 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:18 executing program 5: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r0, 0xbb6, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x1, 0x80, 0x4c, 0x1, 0x6, 0x3f, 0x0, 0x7, 0x25600, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x400, 0x4}, 0x2200, 0x80000001, 0xfffffffe, 0x3, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200}) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:18 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xbc, 0x37, 0x81, 0x2, 0x0, 0xfff, 0x98008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000080), 0x8}, 0x3280, 0x8001, 0x80, 0x5, 0x7bb6, 0x5, 0x40, 0x0, 0x7f, 0x0, 0x2}, 0xffffffffffffffff, 0x3, r3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:18 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:18 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:18 executing program 5: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='syz', r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:18 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:18 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x98050000}], 0x400000000000132, 0x4000000) 14:40:18 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x300}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:18 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:18 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2c01}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:19 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be24475508d358fccfd069e19318b41e71cb1d312e1bea14ec0572cd47eaf22c3275f6c919a92ddda49480f915a6da50377b9f555565d83ade96ac9afeb96352", 0x1e}, 0x48, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x66, 0x62, 0x34, 0x65, 0x63, 0x36, 0x63, 0x66, 0x36, 0x39, 0x37, 0x32, 0x31, 0x63, 0x37, 0x31]}, &(0x7f0000000180)={0x0, "1259b081b5407b3a600e7533ac0effe74cb1e3a842fdcf823fcf10c15076f9e3e8f1f99b4b155e619f65d9c759c2d67a61c20477d4bc33a8b6dd6fa9411d03a2", 0x1e}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xee01, r0) r1 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @perf_config_ext={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r1, 0xfffffffffffffffb) 14:40:19 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xa601}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:19 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:19 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r3, 0xbb6, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) r5 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r5, 0xbb6, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:19 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x9b1e0000}], 0x400000000000132, 0x4000000) 14:40:19 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:19 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xff0f}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:19 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r3, 0xbb6, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) r5 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r5, 0xbb6, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:20 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3f00}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:20 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:20 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:20 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:20 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x30b590}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:20 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:21 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x9e010000}], 0x400000000000132, 0x4000000) 14:40:21 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:21 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:21 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x1000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:21 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:21 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:21 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:21 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:21 executing program 3: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:22 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:22 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xff0f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:22 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xa3020000}], 0x400000000000132, 0x4000000) 14:40:22 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:22 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:22 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 14:40:22 executing program 3: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:22 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) 14:40:23 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:23 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xc8163b}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:23 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x40, 0x0, 0x80, 0x0, 0x6, 0x200, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0xfffffffffffff001, 0x1}, 0x2, 0xfffffffffffffff7, 0x3, 0xc7686562a419eb60, 0xac, 0x40, 0xffff, 0x0, 0x9, 0x0, 0x5}, r1, 0xb, r3, 0x8f871fe9e41de5f8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x4, &(0x7f0000003d40), &(0x7f0000003d80)=0x4) r5 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) preadv2(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/255, 0xff}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/109, 0x6d}], 0x3, 0x9, 0x9, 0x18) 14:40:23 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:23 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xb37d0000}], 0x400000000000132, 0x4000000) 14:40:23 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:23 executing program 3: r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r1) r2 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)='\x19\xfe\x82\xa7\xcc\r\xcf\xa9\x9aV\xc6\x13`\xa9U\x00\x8fq\x9f\xa2\x87\x98\xc9;\x1c\xab\\\xf4aR\x13\a\xc1RI\xfe(J\xc1\xe3\xffT\xd0k@\xc9\xe9\x8e\xc7\xb7\x8f\xda\x8b', r0) r3 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180), &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r3) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$search(0xa, r2, &(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, r3) add_key$user(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="42582ce42037e0b17f1fa20c6b1bc227c52c95de70999308b4918efa0e538faa2c25f5386de09fbeecfa5a7c34b4157306690205221660941b9ce115877f3cdfa090cd7a60c5ab86e28d37e53132d2b352f982106351bb7ceb837b1db29ddf9094c867dc2965d05fd782044eac64925b2f1003f09afbc6a389d41e8ab08004a6bc51ab0d89c369a465ea509d2e487509264fe34f5f2e24233e4c446114221262bcbe2e08573a994534fab9d82961b64e300e9bf0d1255a722fd40b23010da1fe82b3d06d2df13db486b77e3017075ca29c54ec9583844708136acf", 0xdb, r3) add_key$fscrypt_provisioning(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)={0x0, 0x0, @a}, 0x48, r1) request_key(&(0x7f0000000380)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:40:23 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:23 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) [ 1064.789178][T22197] trusted_key: encrypted_key: insufficient parameters specified 14:40:23 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0xeb64939f}, 0x10) 14:40:23 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 14:40:23 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xb80b0000}], 0x400000000000132, 0x4000000) 14:40:24 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x1000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:24 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:24 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0xeb64939f}, 0x10) 14:40:24 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 14:40:24 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0xeb64939f}, 0x10) 14:40:24 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:24 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xbb610000}], 0x400000000000132, 0x4000000) 14:40:24 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:24 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 14:40:24 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) 14:40:25 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:25 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:25 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) 14:40:25 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:25 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:25 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) 14:40:25 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x7000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:26 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xc3450000}], 0x400000000000132, 0x4000000) 14:40:26 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:26 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:26 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xc4920000}], 0x400000000000132, 0x4000000) 14:40:26 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) 14:40:26 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3f000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:26 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:26 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:27 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:27 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:27 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xc8050000}], 0x400000000000132, 0x4000000) 14:40:27 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x4000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:27 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x40000000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:27 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:27 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:28 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:28 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:28 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:28 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5b8cb56a}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:28 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:28 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:28 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xcb290000}], 0x400000000000132, 0x4000000) 14:40:28 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x5000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:29 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:29 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:29 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:29 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:29 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6380a2c4}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:29 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:29 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xd3020000}], 0x400000000000132, 0x4000000) 14:40:29 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:29 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x7000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:29 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:30 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 14:40:30 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:30 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:30 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:30 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:30 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:30 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xd30d0000}], 0x400000000000132, 0x4000000) 14:40:31 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:31 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:31 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:40:31 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2b3cfb80}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:31 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:31 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:40:31 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x90b53000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:31 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xe8030000}], 0x400000000000132, 0x4000000) 14:40:32 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:32 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:32 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x2c010000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:32 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:32 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:32 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:32 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xa6010000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:32 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xeb6c0000}], 0x400000000000132, 0x4000000) 14:40:32 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:33 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:33 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:33 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3b16c800}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:33 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xeffdffff}], 0x400000000000132, 0x4000000) 14:40:33 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:33 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xc4a28063}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:33 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:33 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:33 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:34 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:34 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:34 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xf3500000}], 0x400000000000132, 0x4000000) 14:40:34 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:34 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:34 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3f000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:34 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:34 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:34 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:34 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:35 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:35 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xf4010000}], 0x400000000000132, 0x4000000) 14:40:35 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:35 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:35 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:35 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:35 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xff0f0000}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:35 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x40000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:35 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:35 executing program 3: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:35 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:36 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:36 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:36 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xf7ffff7f}], 0x400000000000132, 0x4000000) 14:40:36 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:36 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xffffff7f}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:36 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:36 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:36 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x80fb3c2b}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:36 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:36 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:36 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:37 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:37 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xfb340000}], 0x400000000000132, 0x4000000) 14:40:37 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:37 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x9f9364eb}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:37 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:37 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xfffffff5}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:37 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:37 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:37 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:37 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:38 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xfffffdef}], 0x400000000000132, 0x4000000) 14:40:38 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:38 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:38 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:38 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0xf) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:38 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:38 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:38 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:38 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x20000050) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:38 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:38 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:39 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:39 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xffffff7f}], 0x400000000000132, 0x4000000) 14:40:39 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:39 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:39 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:39 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:39 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:39 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:39 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:39 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:39 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:40 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:40 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:40 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xffffff8d}], 0x400000000000132, 0x4000000) 14:40:40 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400300, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x40}, 0x1}}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)="70396c9fc6595aa1738893d51d8d87a44955285f6f753c9bfda2f8aa2333c97ec1abdcb3b8", 0x25}, {&(0x7f0000000100)="ca59273170a7c35d1210e2d24d4fe7001c521b55dc9710debba1b9802fc707ad67d0adc0386e81b2f72cc97ea1f6184a8c4d7d1917b8a9ebd0d35e0a052568c7db5165f937b923c0e508bde1fefbe9a7a3bc0cb02b6a18a8a059246b1538c1e218df556ad9473b2dd98ea9b1f259d4f4642f4fea466c8a78225298420258cff9ecfb5b251e3c5d6591e0", 0x8a}, {&(0x7f00000001c0)="db6a809413477d68c5a167e9", 0xc}], 0x3, 0x0, 0x0, 0x40}, 0x80000) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:40 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:40 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xff0f0000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:40 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:40 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:40 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:40 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:40 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:40 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000002, 0x4000000) 14:40:40 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="9a2c87e058dac20eaa90a813a7bc69f3ad959c0f98fa6f5eee8289cd480a1a3ebdfbb8ae79712ac88a7e898b58440e6defb1b1e7e87a6cb6fbeaf41ce31d48f94e333cf4744f4bbc211a9d62e9b00f63e7045b9f", 0x54, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r3) keyctl$read(0xb, r3, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r3) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:40 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:40 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:41 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:41 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xffffff7f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:41 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:41 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000003, 0x4000000) [ 1082.220569][T22788] trusted_key: encrypted_key: insufficient parameters specified 14:40:41 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) [ 1082.390069][T22788] trusted_key: encrypted_key: insufficient parameters specified 14:40:41 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:41 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:41 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000007c0)="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", 0x1000, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="abc0f487b9dd4dc7fa47c84f69390b1100da12d9e7f0b38a79f823d8d549426becfadb21cae313c1e524ef2dd38d97a5c39fcd371463941a48715bc57e84b08c1165947098a9e5ec85947ddd954e4529e4f6e54e11f4d21ae6a73065e959e5fbd84fe175a26715839ed3e6f8b568ecda631414d6", 0x74, r1) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) socket$can_j1939(0x1d, 0x2, 0x7) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:41 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000004, 0x4000000) 14:40:41 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:41 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:41 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:41 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0xfffffff5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:41 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000005, 0x4000000) 14:40:41 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:42 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x81, 0x1, 0x1, 0x5, 0x0, 0x200, 0xc2440, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6f5, 0x1, @perf_config_ext={0x100, 0xcb9}, 0x8401, 0x3, 0x200, 0x9, 0x9, 0x1000, 0x3, 0x0, 0x5, 0x0, 0x7ff}, r1, 0xa, 0xffffffffffffffff, 0x3) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:42 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:42 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:42 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000006, 0x4000000) 14:40:42 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:42 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:42 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:42 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000007, 0x4000000) 14:40:42 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:42 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:42 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="8c659b04c0115c082ea454e9f49e0382bef61ce834fe91b314efeb687a452af2fd5a95fb768009779b773831e9278bc981f924082d9e547d93fd2a", 0x3b}], 0x1, 0xffffff00, 0xfffffffc) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0xee01}}, './file0\x00'}) ioctl$sock_qrtr_TIOCINQ(r3, 0x541b, &(0x7f0000000140)) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000240), 0x10) 14:40:42 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:42 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:42 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:42 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000008, 0x4000000) 14:40:43 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:43 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:43 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000009, 0x4000000) 14:40:43 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:43 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:43 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:44 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:44 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000a, 0x4000000) 14:40:44 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:44 executing program 4: ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000000)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:44 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:44 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:44 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000b, 0x4000000) 14:40:44 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:44 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:44 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:44 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000c, 0x4000000) 14:40:44 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:45 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:45 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:45 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:45 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000d, 0x4000000) 14:40:45 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', &(0x7f0000000080)=@ethtool_rxnfc={0x2d, 0x5, 0xfffffffffffffff8, {0xa, @tcp_ip6_spec={@private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x4e23, 0x4e23, 0xdb}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x9, 0x400, [0x9, 0x7]}, @esp_ip4_spec={@dev={0xac, 0x14, 0x14, 0x3d}, @private=0xa010101, 0xff, 0x5}, {0x0, @local, 0x4f19, 0x6, [0x8, 0x5]}, 0x1}, 0x4, [0x4, 0xc41, 0x1, 0x0]}}) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:45 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:45 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:45 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000e, 0x4000000) 14:40:45 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:45 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:45 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:46 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:46 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:46 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:46 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000000f, 0x4000000) 14:40:46 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "af649eabacf97c1735cede410dcf522fbcb783a130e6cbebb27530740331b26d81e1ed9c45c60f36047f9a111ac2ad4d25c74ea431197df47127b9d505e9d684", 0x3a}, 0x48, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="117cec9e7d4b82014b13cec57e1aec769104df78e72b8781982f00959bab9f3fa6acc64190cac4a90e2caa655d18e48ca3a3807fb132b0b9dbdd721fb5123ad90a8c34165d53e4f9771456c4d6756796ebb9c39914d4e9c97f9f308ecce5c0c35f55ad4704360db84bd8e266140444025672ee0631d41d8522be027eac5eef74ee0b0b76fce5295f40d67b7c4f1079132ff3d4d3a0ccab8cd8bf7fc8ffa89738f6b1f8fda44c69f3510cfcdfbd79c968d5861fada542529902131a4e0abab225", 0xc0, r1) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:46 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:46 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:46 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:46 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:46 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:47 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000010, 0x4000000) 14:40:47 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:47 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:47 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:47 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000080)=""/152, 0x98, 0x10000, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 14:40:47 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:47 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000011, 0x4000000) 14:40:47 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:47 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:47 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:47 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:47 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000012, 0x4000000) 14:40:47 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:48 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:48 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:48 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x7}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:48 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:48 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000013, 0x4000000) 14:40:48 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:48 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:48 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="0ea38b24d55a5cc5cda099bdf538ed6efe6cdcfe1b634e401c004a54b201c9964fdb96eb4b8163e8642f19c3e8794eed603de4b8a68bb02bda7fefb9f02ee562056de0ef657de3a3bbe2ed0b369e2687c390dde6f0f1a2c36b805df0dff044a695ac31", 0x63}, {&(0x7f0000000100)="c26d1ace0f8df51cf3eb142a6a4832d23c738e569eb3e15a21a00db4ca50420069f47e56b01a41b0bb0229dcba921106cbc672e6784be45ea251996813071717dfd8aab5293bdda15bb7798a7c639016d9593c1e0c6939f32a697287bb1ec94c79aa", 0x62}, {&(0x7f0000000180)="a89a25f99f13031eb45a83b4fa4407ce4c2a34f3a96dd265af58606f6c76cb0ff50b3f07ebed5d46adab16752cd17e8605fd748bc13deb61d9c0cfcef7d5c6b05bc93123e9fb3da420c081fa9b6c7a66da4ec0fc96", 0x55}, {}, {&(0x7f0000000200)="48dbe3bf81ca06e5b183722c4eb5a05ebc3df3f06430203b5d47657494a98f1cf24716934388cec417aee1a49d6fbb4b3da602", 0x33}, {&(0x7f0000000240)="0f6dacded39b7343fbf436a519dd6f6322b30dc9c854afaf009a52375b26da858adb45522beba6e798434b50a2812b7154ad06ae79", 0x35}, {&(0x7f0000000280)="50eb97a2eb304eadbf8e19ae5435d99a4f8acf339bf80625f026b03c54ad826212d1c905af7d0e754e43eaa5e3ea8c62cc2e7589bedac9b962b50a5f3750c8c8ed1c7b3662c3fa868e6610ab14447822e50df036dc32a414133a6af72808e47f7105ad9433c570410f88337812a7334b97829a01527eff33b5d8c83b67dce8233e426b786583b4c3d1420fbe5a7fd61ffb85", 0x92}], 0x7, 0x0, 0x0, 0x81}, 0xd0) 14:40:49 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:49 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:49 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000014, 0x4000000) 14:40:49 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:49 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:49 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) keyctl$search(0xa, r0, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, r0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:50 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x12c}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:50 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:50 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000015, 0x4000000) 14:40:50 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:50 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:50 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xc40) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:50 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:50 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:50 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000016, 0x4000000) 14:40:50 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:50 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:50 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:51 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x300}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:51 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:51 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000017, 0x4000000) 14:40:51 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:51 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:51 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x80000, 0x0) 14:40:51 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:51 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:51 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:40:51 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000018, 0x4000000) 14:40:51 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) 14:40:52 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640), 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x12e) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = dup2(r2, r1) write$UHID_DESTROY(r3, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:52 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x500}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:52 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:52 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:52 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) 14:40:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000019, 0x4000000) 14:40:52 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:52 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) 14:40:52 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:52 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:52 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000001a, 0x4000000) 14:40:53 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) 14:40:53 executing program 5: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640), 0x802, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0b0002000000000000000000d700000000000000000000009d0000000000fd00000000ecdf40e65cc780220000001a000000000000e0ffffff000300100000000000000000000004000f000000000000000000000000000000000000000000002001000000000000eafffffebc0000000001000000000000000000004000000000000100258d7a3500000000000000000000000000000200000000000000feffffff00000000000000f2ffffffffffff0300000000000000186d6300000000000000000073797a10fbffffff00000200070000000000d60858b95b03db7f000000000000000000000900000000000fbc7f5c7e5ca7810000000000000073cf000000000000000000000000000000000000000000ffff00003b31e967ac8206eaba86b97eec0b2bed7b003364b18c12dd3b3749693988cfd68928b0d3621c547d8972b58b03603c10fb9751dd584a5d014de36a3fad028f0ac36270dcd6205ee73826df413ac322fbb270b8edabd1ba2b4ee8cbe123c2793330a3af80649e03"], 0x12e) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = dup2(r2, r1) write$UHID_DESTROY(r3, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:53 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x700}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:53 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000001b, 0x4000000) 14:40:53 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='gfs2meta\x00', 0x12000, &(0x7f0000000100)='!\x00') 14:40:53 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) 14:40:53 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:53 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000001c, 0x4000000) 14:40:53 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) 14:40:53 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:53 executing program 5: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:54 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) splice(r1, &(0x7f0000000000)=0x8001, r2, &(0x7f00000000c0)=0x100000000, 0x800, 0x2) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:54 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:40:54 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2c01}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:54 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x500}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:54 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:54 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000001d, 0x4000000) 14:40:54 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:55 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000001e, 0x4000000) 14:40:55 executing program 3: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:55 executing program 2: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x8, 0x0, 0x0, 0x20000}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) clone3(&(0x7f0000000240)={0x10400, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x1f}, &(0x7f0000000100)=""/181, 0xb5, &(0x7f00000001c0)=""/27, &(0x7f0000000200)=[0xffffffffffffffff], 0x1}, 0x58) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000002c0)={{0x1, 0x1, 0xfffffffffffffffe, r1, {0x2}}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x31}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:55 executing program 3: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:55 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:55 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000021, 0x4000000) 14:40:56 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3f00}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:56 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:56 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:56 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:56 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000022, 0x4000000) 14:40:56 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r2) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$search(0xa, r0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x1}, r2) [ 1097.740013][T23351] trusted_key: encrypted_key: insufficient parameters specified 14:40:56 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:56 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:56 executing program 2: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:56 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000023, 0x4000000) 14:40:57 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3f000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1098.281884][T23351] trusted_key: encrypted_key: insufficient parameters specified 14:40:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:57 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:57 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:57 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000024, 0x4000000) 14:40:57 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "98833ab606e7df4fee6a76c01074034d63b08529af7cb7dbf086337a9cd1209754e6cfddc7925bfde0bb90a89786e9f5bb8b362dcb865ed6b045b032306307fe", 0x1e}, 0x48, r0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='}\x00', r1) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="67f30196825cb192eb8145e8be1af18789fe2bde4214c6e62cd1f9f69d4bc2ad6854393c6894aa47872d460ec95fd73d84676281f8ba5f2dfa58bfcd32bdada656ddcc17a9bed60054a032dde45cf0231a4bcb82d55e37b8c45b93af2eda861ff3d90fca3937311b09d7d1dcc8bf420f87a386bb5581511916bda3b5ad8ab3f5464fca3370f75738bc80f754a37dc6eb66203ef19ac1c39036dbd6c4d6ba2d59115f5b770b3982d7febf13613b08fd7a8aafbc9210dd9f108810b0e47dab", 0xbe, 0xfffffffffffffffe) keyctl$link(0x8, r2, r0) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:57 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:40:57 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:58 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0xeffdffff}], 0x400000000000132, 0x4000000) 14:40:58 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:58 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000025, 0x4000000) 14:40:58 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:58 executing program 4: r0 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), 0x4) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)=0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = socket$tipc(0x1e, 0x5, 0x0) ftruncate(r2, 0x7) sendto(r0, &(0x7f0000000040)="e271ec26518c9236c76f6244f4c5f583fb34d644dbb333b60186d822703b6bcafcf814e9a2b07ea94364c81a74cb5f5924fa09f615e985d1f56d9197a86ea55fc5d60e77b2a90a0d01617ad50261465a56f1fb87f9bf", 0x56, 0x40080, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x28}, 'bond_slave_0\x00'}}, 0x80) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:58 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:59 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xff0f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:59 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000026, 0x4000000) 14:40:59 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:59 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:40:59 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:59 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:40:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, r0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c}, 0x0, 0x20, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:59 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:40:59 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:40:59 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000027, 0x4000000) 14:40:59 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) [ 1100.995028][T23461] trusted_key: encrypted_key: insufficient parameters specified 14:41:00 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) [ 1101.262643][T23465] trusted_key: encrypted_key: insufficient parameters specified 14:41:00 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xc8163b}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:00 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:00 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000028, 0x4000000) 14:41:00 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:00 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) 14:41:00 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaab9aaaa86dd601bfc97004d8880fe8000337d8266000000000000000600ff02000000000000000000000000000101004e20004590"], 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000005480)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) poll(&(0x7f00000002c0)=[{r3}], 0x1, 0x0) r5 = add_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="8603a3fd6bc517b1ad7567af202917d1d6a79d702839c465b23660cc6966d8f12a207199f91d7271ee74a843829382efd48fc0b876f0ccebbf07eee52230bc5cd848a12cb475f7ba1683e0729d92b0bbca435cf33f9cebb6fd1ac7edea74d80cbb551ec5db090858f26504cee031a555c3a360684c4c", 0x76, r0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000200)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r7, 0x84009422, &(0x7f0000000300)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001400)=ANY=[@ANYRES32=r8, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES64, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f00000007c0)={{r1}, r6, 0x2, @inherit={0x60, &(0x7f0000000240)={0x0, 0x3, 0x4, 0x5, {0x5, 0x7, 0x4, 0x0, 0x8}, [0x2e, 0x5, 0x4]}}, @devid=r8}) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='-/(._${[@$[\x00', r5) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:00 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:01 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:41:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000029, 0x4000000) 14:41:01 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:01 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:01 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:41:02 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x1000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:02 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:02 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002a, 0x4000000) 14:41:02 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:41:02 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xff, 0x0, 0x43, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="e233a857294af5101c418458389987b2c07f47f52442dc227ad32432c058f5ea28b0607a98921f7a64d581cb5d89230dafc24c0fc134d51fc0579fcf21ef0cb866bc5a30085835527b4b5728ac04e30917ea2c0940a4c8fc44479ccb893f23136e104e0958cd3cc283cd64b6f90704181360f4ae68cbc5ad8c7679bd5fa03df0e380a4cd1373b5f440a812d9d1a2b0a605a0a882b86c14ef251f84af39d7de4091ddd89526ec786676fe5821d0617a6b31f438604df407b536046fbabfe7e7aa84c187c1e0d8bea38e3d112e72aa884b08c3282a15fefebe106f8fd0cd529d", 0xdf, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r0) r2 = socket$tipc(0x1e, 0x5, 0x0) add_key$user(&(0x7f0000001480), &(0x7f00000014c0)={'syz', 0x2}, &(0x7f0000001500)="eac2ab6497fa52e28d9a096d7e61f7a1a33e", 0x12, 0xfffffffffffffffa) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000001540)='ext2\x00', &(0x7f0000001580)='./file0\x00', 0x9a7, 0x8, &(0x7f0000002c40)=[{&(0x7f0000001740)="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", 0x1000, 0x7}, {&(0x7f0000002740)="1e603472034dfff3f20a205bd1e7dd46a92e4486bc27724921d20caa2e892d132203394f099748405a65a43b00132bcb63060c28f3b1ac3d5d732bcdb2935c14ef0537b67a7ac0db1b527bdd7a7d0dfae65e4637ba106074fb642c3cd1c53699a834701ce1fc99c2e166434be63205c3920c6ac8517be496055883600f05c46ea22c460504f65548a305597ebc59abcc97e8", 0x92, 0x1}, {&(0x7f0000002800)="ae20a2712825fff9680fcef35b036d4ba119a56e15cdecf31959f53c0c64649794cafd8f11a5cb019214057b7a9fcc356721b0c76d920d815c5f881b6e44f010c13a07a1a153b6e0d359ac449fbfd5dc74e7e7628b3154b6fc02581e4b49a69f4af09ea9c85dc591e4ff77457981fcb3937a56dd6542fcbf31ac4edb116f321c5b91c0959c4a17fdd4d1bfea62c7af3b8a9f9b9183ad0948cdf2db48ba4923a1ee4cce2ccef3f293e82cbc80fb642cbd026f", 0xb2}, {&(0x7f00000028c0)="c921ac8d32e96c1a23f258797566be12a33fb51a3731739b20d0a6511a508aa6e3c70603c58d832a876606deeca7e1180bdde544aa729b754f28f140e84bd3d6d387cdc0b2115ef806d8e888882359900b27f2917cb750ae7429aea4e8fd81d4f042a836167177c9caf91cbc4b093692704210bf7fa94301f1da655205f2bbaf376aeebd241fb227872f05f21513ba73e1f1e7abffc03c6ae56a8a56533f4df500", 0xa1, 0x3}, {&(0x7f0000002980)="f22af9fd9e26a6bc51a7d3b75265fe28f7512aae85068af79604b11b93581de2cae8fefbbd116405ec120bdfb12210856c9659f73af4fcbe593a7cee84b590dfdac96d1504499465133a7ebba588c8071f6a8888dd3345ecbfa4fbf42ffb8b7f7e6f87b32568c9ee14cd6eac8124f38d75f5da35bf1e9503995f66276458047f464f59d3643d54c3f6ec5e4e441ff32765887932a950aeee40fe8e928107e5c74201bc4d54d8510a8c4d028e9cce63d9d58056f5826f819fc7c5385305781c7ceb45efe53e9132f1f1d13f42f9f8d7ba14b02c227fdd16a05ac1bdf555", 0xdd, 0xffffffffffffffe0}, {&(0x7f0000002a80)="01b43b614305c8240ca54388b0bfacfb42df45d4b950b26f5d0c5693b0554d", 0x1f, 0x80}, {&(0x7f0000002ac0)="72836140c6ea913f00b28eb3381beaf9c9258663cf7987989ffd127e50e8c9bf3e93915591083e6ec38d07814fcfc1e34a8c0e37adad1ac8566a9ed93cc3602978c63c559e69ba4596be3185c76244d2b8a6c933e64d6f174464041e7df1e38f06d65cd4c9afe49a753defdededf9d80844d0b91244cbcf267c283c22ed7a0e2a31bd7", 0x83, 0x6}, {&(0x7f0000002b80)="3fa7a872e50d40f692566c253d38dbabc0f9f3be3f0a54208b9505b60e7a1a2c38db357708e987cc2ef9cb5c418124de7de06f8478143d4c91970935c83715b8f7d504cf7d225f201a8e19c961f5227e40056767f1fa51f05240c975947ef28982fc145563c02ae48dcc11d3183c076ad1d65071a060e387bbfb7cadd62198a06c2a115f45084d6ca01e8bd02123af42c34d32e15febeba48bd969c23536cf", 0x9f}], 0x8, &(0x7f0000002d00)={[{@dioread_nolock}, {@lazytime}, {@data_err_abort}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@data_journal}, {@data_journal}, {@nogrpid}, {@delalloc}, {@sysvgroups}], [{@dont_appraise}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x37, 0x37, 0x61, 0x36, 0x30, 0x36, 0x37], 0x2d, [0x36, 0x66, 0x63, 0x62], 0x2d, [0x52, 0x0, 0x62, 0xfddd1e3035d0f561], 0x2d, [0x62, 0x61, 0x39, 0x37], 0x2d, [0x65, 0x62, 0x35, 0x35, 0x39, 0x38, 0x38, 0x35]}}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@hash}, {@obj_type}]}) r3 = add_key(&(0x7f00000013c0)='.request_key_auth\x00', &(0x7f0000001400)={'syz', 0x1}, &(0x7f0000001440)="b2222ea839508473d84caec06bee", 0xe, r0) add_key(&(0x7f00000015c0)='logon\x00', &(0x7f0000001600)={'syz', 0x2}, &(0x7f0000001640)="cf2e0461f62ae855d0080873b660111316dcf4dbebaba4f32b5961c5ea6e19d86182f3e41e2885df1531882384138eb4e7bc31731eb86e48001d0cf5378e321544fc58496bd2fe71e99b4ded18431397745919f1d52b3dbac28005eec4e762d8cdaf3a08cad554a5f567b68a3efa3435e3938626c60dd646c53ee7b91c055d5ce9ce42c876b5d1cdedcb3a04ce94c914fd50c93366f61dbd85029163746f8f80822efe229eede084095845b69744f1ec34b824ef2245c8de3257312b1edec467db1df0a7237140e9a2c672d046b64d73629291596b70549abee5c5", 0xdb, r1) add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="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", 0x1000, r3) 14:41:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:02 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) [ 1103.349250][T23537] loop4: detected capacity change from 0 to 16383 14:41:02 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:02 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002b, 0x4000000) [ 1103.459540][T23537] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 14:41:02 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:03 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:03 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:03 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002c, 0x4000000) 14:41:03 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r0, 0xbb6, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='-\\!)/^+$\',\x00') r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:03 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:03 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:03 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:03 executing program 2: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:03 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:03 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002d, 0x4000000) 14:41:03 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r2 = io_uring_setup(0x3b81, &(0x7f00000000c0)) syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f00006d5000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x5, 0x0, &(0x7f0000000040)=""/18, 0x12}, 0x0) syz_io_uring_submit(r0, r4, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000400)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd, 0x0, {}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r5}}, 0x10001) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:03 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:04 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:04 executing program 2: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:04 executing program 5: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002e, 0x4000000) 14:41:04 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:04 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:04 executing program 2: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:04 executing program 5: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:04 executing program 3: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x40000000000002f, 0x4000000) 14:41:04 executing program 5: r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:05 executing program 2: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:05 executing program 5: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:05 executing program 3: add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:05 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:05 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:05 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x4000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:05 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400300) 14:41:05 executing program 5: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:06 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x93c2f7678c650f1f, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r2) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "05376ec6748c3b1dbab332fab3e21b732fe8d37a5d75946080b66b5c7b1f00143848d41d307ed3fbd7dd767ea7d494584497d5dbde1258561be23ee8325c2ace", 0x23}, 0x48, r2) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)=':}\xa9*&}\x00', r0) 14:41:06 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:06 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:06 executing program 5: socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x6ab58c5b}, 0x10) [ 1107.452749][T23673] trusted_key: encrypted_key: insufficient parameters specified 14:41:06 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:06 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:06 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) [ 1107.822966][T23673] trusted_key: encrypted_key: insufficient parameters specified 14:41:06 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:06 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r3, 0xbb6, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x9, 0x39, 0x0, 0xff, 0x0, 0x8, 0x1100, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000005c0), 0xe}, 0x0, 0x9, 0xb8, 0x5, 0x1, 0x4, 0x4, 0x0, 0xc98, 0x0, 0x7f}, 0x0, 0x6, r4, 0x1) add_key$keyring(&(0x7f0000000680), &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, r0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) r5 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x352, 0x20000) sendmsg$tipc(r5, &(0x7f0000000580)={&(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x3, 0x3}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000380)="d1f9a0fb8601dc7975c70024b5f0c04cd25ddf6415d59ce6a5d4bb402ae8252a5463ac490bf7ae6d9644eac94a51782bbbec412e7444b8384a64ec0733e1ef8a4da358a12fd60e4e331266bfc9e7304a90aa5b12b774b4e7ab95f93074ed4e0601b160600b0414622059ead45157faa0414e4c284028b9f6b8d0dec71f84573f84876f95420d75b96fae8e2db3e3a7d3d4cea1ce745a52e1aed948f18978f9ebd22ad95a8fa96566793ea730242704e2cffcd72de697f2fba9734379834f04b43b62dfb910c0e9b338fd02bc1e78544e4621646b22506a2beb3b77fd8280a139f067e2137a034375996b4df99eabe4db8677dda8bdbe", 0xf6}, {&(0x7f0000000480)="0e1b670d909352394cc9b003570d6bb74e3ada3905eb91715ac8eddb1bba52a3fab1c169f10c652ae501743fffae3c7b55a1d36fefe2f0a2ff7c5df28ab3d2951090a4f433ab88d5dfdab1", 0x4b}], 0x2, &(0x7f0000000500)="e9ed4a0774030c5cdb82f24774da2e93605be7e179c12250c908e38f4ca2459524288216be4034c5a9518ac7c7b0b7192cb8f3c9d7c06e1ea9950821ded9c5ca803709c99e2c3fd6cf86e2f7da87476e", 0x50, 0x20000050}, 0x20000011) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) sendmsg$tipc(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c72897b0a3e51b6ccf2a6d50344eefd2ab58841127d57bbaf83a207e78383439ead1e03d7ded1c8ecc4676a34fd96666a5b205c99799df026f17230853b9d5b5999c108a7f38ebd70cba7f90025a88454539f831454be57c04176d733b68263a941ce6dd357d09f40979bc7d6e1b81169c64ff1ee94714497331ce3da2da6359f82438c0101821c4e2154d6dc0802aeb0293c6fa8ab2b7ab06e89e93f910c79c00f2bf61189cfd387f8c4a8b75cd9ea04f653459751206949d03117a44e48d6afd988a001732343e1cb904a86d29d1ec5b92d117f0cc50d55eea9d", 0xdb}], 0x1, &(0x7f0000000300)="4863a9d7b1218a2d3fb08d79bf9c4eab27b5e803dcf142", 0x17}, 0x4001) socket$tipc(0x1e, 0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:07 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:07 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x1000000) 14:41:07 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:07 executing program 3: add_key$keyring(0x0, &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:07 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:07 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:07 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) 14:41:07 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:07 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:07 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:07 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:08 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000)={0x43, 0x4, 0x2}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r2 = getpid() sendmsg$tipc(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x3, {0x4e22, 0x3}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000140)="d63911e9c5a66d7b38eebbfd8603795c6a3d2ea96567e9fb970c9bda1f33660f03b09a1088f17ed8c6f78e538b9832bc8d", 0x31}], 0x1, &(0x7f0000000280)="85b15047a0513e5e525bd2e8bf22f494ada05ce8327a3ae8a95c58b42f7e05772149aaccf6518564ca2b7c6dd36a6664cd5bc75d34bc08276914caec506c756b7198ac2432795f30c25ab03f2d2927a1afff558a432f0af95fc125200919a9b71ccf19c5a40f64066b4c09ba0b4ce5da56682cae8eb5821babf8f4222f7addd17b4d9c01c8935ad2ec4b73a571cfefa86a902bd2ca1a01aa146f5c347194d35bc3cd9ab6bd65b2d7ac995b01b015fd289d0a706e23713a3590b009841848dbbb45a9a0121ff18558e7972824640b20e8473a3a2edee99e488ceab6d4278fc318", 0xe0, 0x20000000}, 0x0) sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) dup2(r0, r0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x8, 0x8, 0x44, 0x5, 0x0, 0x8, 0x800, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x6}, 0xa880, 0x9, 0x3, 0x5, 0x1, 0x9, 0x8, 0x0, 0x5, 0x0, 0x8}, r2, 0x7, r0, 0x2) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:08 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x7000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:08 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:08 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:08 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:08 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x2000000) 14:41:08 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x50025, 0x0, 0x0, 0x7, 0xc80, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000080)=""/208, 0xd0}, {&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000280)=""/69, 0x45}, {&(0x7f0000000300)=""/82, 0x52}, {&(0x7f0000000380)=""/150, 0x96}, {&(0x7f0000000440)=""/72, 0x48}, {&(0x7f00000004c0)=""/187, 0xbb}, {&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000640)=""/36, 0x24}], 0xa, 0x4, 0x1f) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), 0x4) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3d}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0xc008840) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000007c0)='\xb0%-!\x00', 0x0, r2) 14:41:08 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6ab58c5b}, 0x10) 14:41:09 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:09 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:09 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:09 executing program 5: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:09 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x3000000) 14:41:10 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2b3cfb80}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:10 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r1 = socket$tipc(0x1e, 0x5, 0x0) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:10 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:10 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:10 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:10 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000002) 14:41:10 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:10 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x7000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:11 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x62, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x67}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f00000002c0), &(0x7f0000000100), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r1) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r1) r2 = socket$tipc(0x1e, 0x5, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='{+\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "243b0a932fd44cf341ad683ef99831c56b697cabe1e6d9a71740a30120d752bd6ecb5e4cf76c70654d4d0f51385115b3c9c7612584d2e8426e09fed56a28c70b", 0x22}, 0x48, 0xffffffffffffffff) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r4) keyctl$read(0xb, r4, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$link(0x8, r3, r4) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x3, 0x2}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:11 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:11 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) [ 1112.514251][T23839] trusted_key: encrypted_key: insufficient parameters specified 14:41:11 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x1000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1112.769901][T23839] trusted_key: encrypted_key: insufficient parameters specified 14:41:11 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2c010000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:11 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000004) 14:41:11 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xff0f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:11 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:11 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x20c088, 0x0) 14:41:12 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x1000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:12 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000000)={0x9, &(0x7f0000000580)=[{0x8001, 0x84, &(0x7f0000000080)="710a34195ba932b4a0891fe60575fea4d9319dda9d2ab4afc0f7664630bda77fb73d973f57eaae72704005b1cd547bf1b0ea19ee72def441e2da0b6030c0917c151a6cb8eb30b0642377fcb35bc9307a1befd90d1c34d5ac74ff082fc598c422fe415e59531241cceb781d9d9121080089004f961af019deff43c6589b7d91fdc10100d5"}, {0x3, 0x70, &(0x7f0000000140)="530d0d859030a94a1c9be643c5fa32cd5123712590cbf83894a31087a57058fb1b9fbf1100c8b2e3f3d932c5e3f7a04a752ec04a4a5a6d1ebdc2b7bfaeb9ec58646285afa36e7ec555a2e17022c85d44704c58a5994fcd45b1f9b8567d6a9227ed19cee156b4e0382d5b5a14eaeb5bd4", 0x1}, {0xff, 0x6e, &(0x7f00000001c0)="3877c03598f586d5c82eab4bfe8509b75899251f3671cf5bd5e8d8bbb75290e37800081b4db148512bd386065a1ab1d65038aa5fb2610bde64cbf078a09279013994e5d245f9a00b223b29d333a19394bf62d98e2816a2fea6228eeb587a06782a9622a982c926b5eb80d717eebb", 0x1, 0x1}, {0x6, 0x5f, &(0x7f0000000240)="eff088e153ee3adbad7a39f525aa344ff9cc1cdf95bc9149bc0f77ca4bc7be0ab5a5942b53a9cd95fd2e35f22b301c5ac74f51b3c8fc9544c15bf9b96841c47cff0158b63dfb47b66f8068665384f681175bbaaed0c371df8efeffcebe985f", 0x1}, {0x1000, 0x69, &(0x7f00000002c0)="e7e98701f004e0429e9e61b33163b52cb3f6b7d418ca3b6fd6f60d733ba91c3b81bb0aea6460b04bf846b5b775119cf5d2db60635bf26d63f4eaa68a76160260d7fa7b0b785938882c5723bec5a2bb38473e8ef96969e858476ea264534f6183d4acd4ab6c49865b64", 0x0, 0x1}, {0x5, 0x86, &(0x7f0000000340)="8e5cd2bb4da14528efba5d63d90993e9887af4096771870208a901b189802c372fcdc2bc0b33e46acca7dbb891b711b1d861d50225a0c5242907e850b442319051ecd5108e6dc5ff690ef8a66c209445b29bbf57fa2bb91daa5d6941cca6fcd90a19f7764a6503c67dd5d6d895618afcd36d9f47a4a70a92f26a69c83460f31a29ab99e61283", 0x1}, {0x5, 0x1000, &(0x7f00000007c0)="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"}, {0x1f, 0x94, &(0x7f0000000400)="962e4378fca83e1acba08b50f19503723f5c918d1aad00003ca269b3a2f8b23ad87ffac2ffc49d4f375827f97f68fe77e0dd3a26c338d9ea66f984cb9b9d05bc4b871e970d877a3d9b4fff57822eae9c1106463a5d8c57907abbe543d82e4d065dabecb958cf95d5cd6f9e0dcaf19d508b7d3931e8d09807045362a2d9f67517887d419ae60eedea23f1ec8fcd4b7370c86b337a", 0x1, 0x1}, {0x6, 0x90, &(0x7f00000004c0)="6c0afc34847c74f57abb6fa3be5a5139aff3f1d2908bf3bd94598dda2c6b259ec0aeafef3c6a55945510da303572914c1a8479d6ea32b08d1e4a87cd8b4599be548ebf0219bbeb64c2babec3b24558b1e9a7d9e39be94a2c77fb199970377e25508f3a38d8177f522d1a76cc2b0956eff2cf5dd1db2b3a18eaf4fd1e988a0c8ec21bc26f69ba5488c22ac5ffcc7bd8cf", 0x1, 0x1}]}) socket$tipc(0x1e, 0x5, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:12 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:12 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x6, 0xbf, 0x6a, 0x1, 0x0, 0xfffffffffffffffb, 0x400, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0x80}, 0x4000c, 0x88, 0x101, 0x2, 0x9, 0x9, 0x0, 0x0, 0xead1, 0x0, 0x7}, r2, 0x8, r0, 0x8) r4 = fork() perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xfd, 0x7c, 0xff, 0x80, 0x0, 0x9, 0x1040, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x361, 0x4, @perf_config_ext={0x8, 0x6}, 0xa090, 0x3f, 0x4, 0x4, 0x5, 0xffffffff, 0x673, 0x0, 0xffff8000, 0x0, 0xc9}, r4, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x1, 0x7, 0x1, 0xe4, 0x0, 0x14000, 0x20000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x2801, 0x1, 0x4, 0x6, 0x100, 0x20, 0x6, 0x0, 0xb6eb, 0x0, 0x6}, 0x0, 0x7, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:12 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) 14:41:12 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:41:12 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:13 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3b16c800}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:13 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000007) 14:41:13 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:41:13 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:13 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="d1622302d835eca1128cad73f175307c8b4274f8fa27a9884106a279b7c88ba5249cbe501be8906c0b2489a7f8f9fb52d5ef3d54034b584c76f320a239d4ece9f8293cf66c1d50db650c667bac23a8f3f6f6dfbd10505e0680dcbdf7c1d7a8bda27e3b5a6db480c35fdb9d0cb54591c616a63438aca0f352de69072bedd55d948858ae0dcc607b1f3db76dd9eee48a077cc33aa86744fe69b6d3213fe04f884dc3c98ce5cef80f4b2f6dacee4f0eefcde7db90fad95535836518fe6bc581003b3ef3f21806c0a8851808ed67ec91d66b4ceb358b26a16b8db56eb8f76962aa25", 0xe0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r2) [ 1115.058750][ T1357] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.065425][ T1357] ieee802154 phy1 wpan1: encryption failed: -22 14:41:14 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:14 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) 14:41:14 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:14 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:14 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000050b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0x6, 0x8}, 0x0, 0x4}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) r2 = getpid() sched_setattr(r2, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xea, 0x8, 0x81, 0x40, 0x0, 0x7c0, 0x8b, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1ff, 0x5eb2, 0x3, 0x100000000, 0x1, 0x200, 0x0, 0x80, 0x0, 0x20}, r2, 0x3, r0, 0xa) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:15 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3f000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:15 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000008) 14:41:15 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 5: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x3f, 0x2, 0x64, 0x1, 0x0, 0x0, 0x42165, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x4}, 0x0, 0x6, 0xfffffffe, 0x8, 0xcaa, 0x3, 0x7, 0x0, 0x200, 0x0, 0x1}, r1, 0x6, 0xffffffffffffffff, 0xe) 14:41:15 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:15 executing program 5: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:16 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:41:16 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:16 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40040, 0x3}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:16 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) 14:41:16 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x40000000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:16 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:16 executing program 2: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:16 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000002, 0x11, r0, 0x4914000) 14:41:16 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000011) 14:41:16 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000030) 14:41:16 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:17 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x20, 0x2, 0x7, 0x2}}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:41:17 executing program 4: msgrcv(0x0, &(0x7f0000000000)={0x0, ""/148}, 0x9c, 0x2, 0x3000) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:17 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000060) 14:41:17 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:17 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x5}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:18 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x80fb3c2b}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:18 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x20, 0x2, 0x7, 0x2}}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:41:18 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:18 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:18 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000131) 14:41:18 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="1f9440dd748af318787954ec83be67de16477a28a81c3308a854507d6544ce96f1a7ff85a48c9a8215e00b5e32d8d3fa3cb810ccdc385b5d7489ba2fe4dff1c3ae642a171811e224c5f6eeccfd8cf8bdc6993473fa46a831111d65b52b8c607e9d428daf2856d4889c6a7924bccedbc3", 0x70, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:18 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:18 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_timestamps\x00', 0x1, 0x0) lseek(r2, 0xbb6, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x6, 0x20, 0x2, 0x7, 0x2}}) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) 14:41:18 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:18 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400019e) 14:41:18 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:19 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x40001f4) 14:41:19 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x9f9364eb}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:19 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:19 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x3}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:19 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:19 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x40002a3) 14:41:19 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:19 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:20 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:20 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:20 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:20 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:20 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) sendmsg$tipc(r1, &(0x7f0000000200)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="e5b0ca30c5a2f9769ad1cfed7ba3625b59bc635015d52e55f76cda1aebd3d2a43666545621fe565e55cac1580e54b89c4ca700597724a713a154778e9b436dea4d80096c0685b5fa383148194d7c7496e617b87aad9732c0ad4f65f50516c45a73329aa51205c831cdb9f83dfed4a5ba88d779648a77ab031738ea4abefd8c6b6a2200f37f54545c0c67155b4dffe13a09e80d931d72d24078582c5b27cc1b622a58c20b48712eb97ef7bd66a8be9efcac258bfe0983932875c774e164faa1c4a2284c04b97e770e45917ad7006e615b0316c432282421945eeb4c49ba51da9ebbe1cb0c8491da0f415271e208", 0xed}, {&(0x7f00000007c0)="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", 0x1000}], 0x2, &(0x7f00000001c0)="533ba8815e0b11c2d76a746dd287cb0d9c9acff88bc8fa", 0x17, 0x20000801}, 0x4000880) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:21 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:21 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x40002d3) 14:41:21 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:41:21 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0x2}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:21 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:21 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000319) 14:41:21 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:21 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:22 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) 14:41:22 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:41:22 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x40003e8) 14:41:22 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:22 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:22 executing program 3: add_key$keyring(&(0x7f0000002740), 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xcfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) 14:41:22 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:22 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:23 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x26036daa7c6926bd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:23 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0xeb64939f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) 14:41:23 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) 14:41:23 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000598) 14:41:23 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:23 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:23 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x40005c8) 14:41:24 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xff0f0000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:24 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) keyctl$unlink(0x16, r0, 0xfffffffffffffffb) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, r0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x9, 0x5, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x80000001, 0x1, @perf_config_ext={0xffffffffffff55d4, 0x7}, 0x0, 0x100000001, 0x80000001, 0x0, 0x3, 0x0, 0x100, 0x0, 0x7024}, 0x0, 0xa, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r2, &(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, r0) 14:41:24 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x170) 14:41:24 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:24 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:24 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:24 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:24 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:25 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:25 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000700) 14:41:25 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="b50adbcbc85b83eb", 0x8, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10004}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:25 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:26 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xffffff7f}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:26 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:26 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) 14:41:26 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400083b) 14:41:26 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:26 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000080)=0x28) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:26 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:26 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) 14:41:26 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000bb8) 14:41:26 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:26 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:26 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000dd3) 14:41:27 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xfffffff5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:27 executing program 5: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:27 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x0, 0xf5ffffff}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:27 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:27 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat(r2, &(0x7f0000000380)='./file0\x00', 0x200080, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000000c0)='./file1\x00', r4}, 0x10) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000600)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) flock(r3, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB='/d(\f\x00\x00r0\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cifs\x00', 0x800084, &(0x7f00000002c0)='sit0\x00') setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:27 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4001100) 14:41:27 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) [ 1128.779426][T24337] Malformed UNC in devname [ 1128.779426][T24337] [ 1128.796897][T24337] CIFS: VFS: Malformed UNC in devname 14:41:27 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 5: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) [ 1129.579800][T24337] Malformed UNC in devname [ 1129.579800][T24337] [ 1129.586750][T24337] CIFS: VFS: Malformed UNC in devname 14:41:28 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0xf) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:28 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:28 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400136b) 14:41:28 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x2}, r0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:28 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:30 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:30 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000000)=""/10, 0xa}, {&(0x7f0000000100)=""/160, 0xa0}, {&(0x7f00000001c0)=""/11, 0xb}], 0x3, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x40000140) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000440)={0x2, 0x4, {}, {0xee00}, 0x342daa8, 0x6}) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000480)={{0x3, r0, 0xee01, r1, 0xffffffffffffffff, 0x24, 0x6}, 0x4, 0x2f8f, 0xfffffffffffff7bc, 0x1443, 0x0, 0x0, 0x4}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:30 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:30 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) [ 1131.947895][T13082] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN [ 1131.959824][T13082] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 1131.968228][T13082] CPU: 1 PID: 13082 Comm: kworker/u4:12 Not tainted 5.15.0-rc7-syzkaller #0 [ 1131.976892][T13082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.986939][T13082] Workqueue: netns cleanup_net [ 1131.991705][T13082] RIP: 0010:tipc_conn_close+0x48/0x1c0 [ 1131.997164][T13082] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 b0 03 00 00 4c [ 1132.016771][T13082] RSP: 0018:ffffc9000320fbb8 EFLAGS: 00010216 [ 1132.022835][T13082] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1132.030799][T13082] RDX: 0000000000000003 RSI: ffffffff88ae9f44 RDI: 0000000000000018 [ 1132.038758][T13082] RBP: ffff8880889bb000 R08: 0000000000000001 R09: ffffffff8fcff9ef [ 1132.046714][T13082] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88807abb9858 [ 1132.054666][T13082] R13: ffffed100f577313 R14: ffff8880889bb008 R15: ffff8880889bb000 [ 1132.062628][T13082] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 1132.071551][T13082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1132.078119][T13082] CR2: 00007f382226638b CR3: 000000007eb67000 CR4: 0000000000350ee0 [ 1132.086075][T13082] Call Trace: [ 1132.089335][T13082] tipc_topsrv_exit_net+0x227/0x5d0 [ 1132.094527][T13082] ? tipc_topsrv_init_net+0xb90/0xb90 [ 1132.099883][T13082] ops_exit_list+0xb0/0x160 [ 1132.104371][T13082] cleanup_net+0x4ea/0xb00 [ 1132.108775][T13082] ? unregister_pernet_device+0x70/0x70 [ 1132.114309][T13082] process_one_work+0x9bf/0x16b0 [ 1132.119231][T13082] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1132.124586][T13082] ? rwlock_bug.part.0+0x90/0x90 [ 1132.129509][T13082] ? _raw_spin_lock_irq+0x41/0x50 [ 1132.134520][T13082] worker_thread+0x658/0x11f0 [ 1132.139182][T13082] ? process_one_work+0x16b0/0x16b0 [ 1132.144363][T13082] kthread+0x3e5/0x4d0 14:41:30 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4001903) [ 1132.148417][T13082] ? set_kthread_struct+0x130/0x130 [ 1132.153601][T13082] ret_from_fork+0x1f/0x30 [ 1132.158007][T13082] Modules linked in: 14:41:31 executing program 1: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x3}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x20000050) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x2, 0x0, 0x110}, 0x12001) clone(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:31 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4001b78) 14:41:31 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='\x00', r0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x40}, 0x10) mount(0x0, 0x0, 0x0, 0x0, 0x0) 14:41:31 executing program 3: keyctl$get_persistent(0x16, 0xee01, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 2: keyctl$get_persistent(0x16, 0xee01, 0x0) add_key$keyring(&(0x7f0000002740), &(0x7f0000002780)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 5: perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x40, 0x0, 0x3}, 0x10) 14:41:31 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x200e402, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4001e9b) [ 1132.702274][T13082] ---[ end trace aa2c433a8de4cf23 ]--- [ 1132.715637][T13082] RIP: 0010:tipc_conn_close+0x48/0x1c0 [ 1132.722172][T13082] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 63 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 08 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 4d 01 00 00 4c 8b 6b 18 4d 8d a5 b0 03 00 00 4c [ 1132.799067][T13082] RSP: 0018:ffffc9000320fbb8 EFLAGS: 00010216 [ 1132.819241][T13082] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1132.847198][T13082] RDX: 0000000000000003 RSI: ffffffff88ae9f44 RDI: 0000000000000018 [ 1132.855201][T13082] RBP: ffff8880889bb000 R08: 0000000000000001 R09: ffffffff8fcff9ef [ 1132.903350][T13082] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88807abb9858 [ 1132.931821][T13082] R13: ffffed100f577313 R14: ffff8880889bb008 R15: ffff8880889bb000 [ 1132.976554][T13082] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1133.021283][T13082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1133.057220][T13082] CR2: 00007ffdfde7fbc0 CR3: 000000001ecaf000 CR4: 0000000000350ef0 [ 1133.086016][T13082] Kernel panic - not syncing: Fatal exception [ 1133.092940][T13082] Kernel Offset: disabled [ 1133.097516][T13082] Rebooting in 86400 seconds..