Warning: Permanently added '[localhost]:42596' (ECDSA) to the list of known hosts. 2022/10/04 06:42:59 fuzzer started 2022/10/04 06:42:59 dialing manager at localhost:35095 syzkaller login: [ 46.734215] cgroup: Unknown subsys name 'net' [ 46.854442] cgroup: Unknown subsys name 'rlimit' 2022/10/04 06:43:13 syscalls: 203 2022/10/04 06:43:13 code coverage: enabled 2022/10/04 06:43:13 comparison tracing: enabled 2022/10/04 06:43:13 extra coverage: enabled 2022/10/04 06:43:13 setuid sandbox: enabled 2022/10/04 06:43:13 namespace sandbox: enabled 2022/10/04 06:43:13 Android sandbox: enabled 2022/10/04 06:43:13 fault injection: enabled 2022/10/04 06:43:13 leak checking: enabled 2022/10/04 06:43:13 net packet injection: enabled 2022/10/04 06:43:13 net device setup: enabled 2022/10/04 06:43:13 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/04 06:43:13 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/04 06:43:13 USB emulation: enabled 2022/10/04 06:43:13 hci packet injection: enabled 2022/10/04 06:43:13 wifi device emulation: failed to parse kernel version (6.0.0-rc7-next-20220930) 2022/10/04 06:43:13 802.15.4 emulation: enabled 2022/10/04 06:43:13 fetching corpus: 0, signal 0/0 (executing program) 2022/10/04 06:43:14 starting 8 fuzzer processes 06:43:14 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x3f, 0x80, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x7, 0x7800}}) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000800)={'vlan0\x00', @ifru_addrs=@nfc}) 06:43:15 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000f80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40801}, 0x2000c084) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000fc0)="d9e3428dfd0290e61285add935c41009", 0x10) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:43:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$negate(0xd, r4, 0x4, 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001980), &(0x7f00000019c0)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$reject(0x13, r1, 0x3, 0x2, r8) 06:43:15 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_STAT_ANY(r5, 0xf, &(0x7f0000000580)=""/114) shmctl$SHM_LOCK(r5, 0xb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640)='\x00') 06:43:15 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r8 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @desc2}, &(0x7f00000006c0)={0x0, "26f8d5f41b47608e12828b5c828d2976b89b99d2f1c6dbb4e078c9d0daa8cf31c5d1ed3db8f66e83181e1e4c9670233d5034b78c970f1c30fc69ea981d29e257", 0x16}, 0x48, r5) keyctl$unlink(0x9, r5, r8) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000740)="7ba8e9c237e28711895db45f97758afe6a6446dea238bbbb3ba22157fe21259e158dcb5a669220fd688b1d4ce9c96d959a46", 0x32) [ 61.332506] audit: type=1400 audit(1664865795.062:6): avc: denied { execmem } for pid=287 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 06:43:15 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) r5 = eventfd2(0x5e9, 0x80000) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000d00)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f0000000840)="4f15b3b1e28921b12b92b794cb9e9f4ad9f9dfb70e61cbe540c9a79f9d98f9687f985d2ed061812e1ce9c3c7a56330d25bb6b9a2a9ab2fb34c5bc1b25ba3ed7e85304cfbfdd345cbc7409166560447ddb7ec0c5d7260c3953d0060b45fd7aedb2ad727214ad97c076a05c53424a8b1dc8ec31aa0c96107685cf317a62e7929e266661a2c4da2a0b78c174b0fdb8e129fccf8bd0a4bc531304f17cae9a0a5c343ea9b2f95be035184467ba833980756e0aa246de426d578f3b785e4a1112fbb16357f8ae8289b13326c215f1b7616658c321b4f65b97d27de93ca46930aacba8ee433e4", 0xe3, 0x8, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x7fff, r1, &(0x7f0000000980)="48fa74e90f30341214bdafb711894b4831482d14ed7f8ad0c0cd482f0e47edd2", 0x20, 0x8, 0x0, 0x1, r5}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000a00)="4d5c4f012a0782aeb0b729791f564ece25e7ece70168a7ef471df510af16471dae35ba08de66c6d47654de6420e1a58675a971e9c5c4ea9c1faf6c7ea3aa4b3424ccedf70480ab6efa539841c3520fffd6f8226abe71bdb749f166a531eb87d0a73805d099b2ac529beb0ebe181e087abd4512c903ab9b266400a24914c9fba77e096f4e7156", 0x86, 0x80000000, 0x0, 0x2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x2, 0x1, r6, &(0x7f0000000b40)="f559bd43f3c61faaafb22ffcb076e971bf141a299787f149836cf7c5d040060dd627f637f962e70e487eac6b5a931f046148fc711a4a94a7b3170ae23d661caa32a8aadc33e9aa13bcd03d9f586e4d9258d5730ad05f4c9fa30d0a1139047f1b19fbef4b03016165bf19f45f6020f66dc380e54f8100051e177f763fcbff0be55498eada391c7f7720ff0d176d3d6638d04c5f684af436981c82b1496beadd9a7ad134d4bb6cb7cc6cb35bd601526fb436d0d146e949e4d994cae3ac9cf14d", 0xbf, 0x9, 0x0, 0x1}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x1, 0x48, r7, &(0x7f0000000c80)="af1db140615d71aa874b35bc79d75f889b17904a9a609ff70b97bac91813c15ed7a1689c6636204bccd125", 0x2b, 0x7, 0x0, 0x1}]) getgid() keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:43:15 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)=0x0) r5 = eventfd2(0x9, 0x0) io_cancel(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000a40)="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", 0xfb, 0x800, 0x0, 0x0, r5}, &(0x7f0000000b80)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f0000000c00)=0xde, 0x4) 06:43:15 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r6, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) [ 62.713180] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 62.715170] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 62.716988] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 62.717963] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 62.720004] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 62.720974] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 62.725398] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 62.726488] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 62.729079] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 62.729973] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 62.731746] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 62.733072] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 62.738087] Bluetooth: hci1: HCI_REQ-0x0c1a [ 62.739325] Bluetooth: hci0: HCI_REQ-0x0c1a [ 62.776264] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 62.778489] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 62.779730] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 62.782158] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 62.786886] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 62.788167] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 62.797360] Bluetooth: hci7: HCI_REQ-0x0c1a [ 62.804311] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 62.804630] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 62.807710] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 62.809448] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 62.812203] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 62.814196] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 62.815523] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 62.819581] Bluetooth: hci3: HCI_REQ-0x0c1a [ 62.819762] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 62.826735] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 62.829283] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 62.830985] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 62.832498] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 62.837235] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 62.837792] Bluetooth: hci5: HCI_REQ-0x0c1a [ 62.839703] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 62.841786] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 62.843441] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 62.845080] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 62.852047] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 62.855350] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 62.857518] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 62.858882] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 62.860485] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 62.861719] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 62.863350] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 62.868180] Bluetooth: hci4: HCI_REQ-0x0c1a [ 62.868202] Bluetooth: hci6: HCI_REQ-0x0c1a [ 64.792430] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 64.794191] Bluetooth: hci0: command 0x0409 tx timeout [ 64.795278] Bluetooth: hci1: command 0x0409 tx timeout [ 64.855771] Bluetooth: hci7: command 0x0409 tx timeout [ 64.856999] Bluetooth: hci5: command 0x0409 tx timeout [ 64.857865] Bluetooth: hci3: command 0x0409 tx timeout [ 64.919857] Bluetooth: hci6: command 0x0409 tx timeout [ 64.920909] Bluetooth: hci4: command 0x0409 tx timeout [ 66.840544] Bluetooth: hci1: command 0x041b tx timeout [ 66.841209] Bluetooth: hci0: command 0x041b tx timeout [ 66.903758] Bluetooth: hci3: command 0x041b tx timeout [ 66.904204] Bluetooth: hci5: command 0x041b tx timeout [ 66.904607] Bluetooth: hci7: command 0x041b tx timeout [ 66.967781] Bluetooth: hci4: command 0x041b tx timeout [ 66.968209] Bluetooth: hci6: command 0x041b tx timeout [ 67.439358] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 67.447072] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 67.463050] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 67.471494] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 67.476020] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 67.477365] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 67.485243] Bluetooth: hci2: HCI_REQ-0x0c1a [ 68.887712] Bluetooth: hci0: command 0x040f tx timeout [ 68.888163] Bluetooth: hci1: command 0x040f tx timeout [ 68.951760] Bluetooth: hci7: command 0x040f tx timeout [ 68.952602] Bluetooth: hci5: command 0x040f tx timeout [ 68.953452] Bluetooth: hci3: command 0x040f tx timeout [ 69.015807] Bluetooth: hci6: command 0x040f tx timeout [ 69.016836] Bluetooth: hci4: command 0x040f tx timeout [ 69.527825] Bluetooth: hci2: command 0x0409 tx timeout [ 70.935845] Bluetooth: hci1: command 0x0419 tx timeout [ 70.936713] Bluetooth: hci0: command 0x0419 tx timeout [ 70.999754] Bluetooth: hci3: command 0x0419 tx timeout [ 70.999820] Bluetooth: hci5: command 0x0419 tx timeout [ 71.000324] Bluetooth: hci7: command 0x0419 tx timeout [ 71.063869] Bluetooth: hci4: command 0x0419 tx timeout [ 71.063924] Bluetooth: hci6: command 0x0419 tx timeout [ 71.575762] Bluetooth: hci2: command 0x041b tx timeout [ 73.623773] Bluetooth: hci2: command 0x040f tx timeout [ 75.671747] Bluetooth: hci2: command 0x0419 tx timeout 06:44:12 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r8 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @desc2}, &(0x7f00000006c0)={0x0, "26f8d5f41b47608e12828b5c828d2976b89b99d2f1c6dbb4e078c9d0daa8cf31c5d1ed3db8f66e83181e1e4c9670233d5034b78c970f1c30fc69ea981d29e257", 0x16}, 0x48, r5) keyctl$unlink(0x9, r5, r8) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000740)="7ba8e9c237e28711895db45f97758afe6a6446dea238bbbb3ba22157fe21259e158dcb5a669220fd688b1d4ce9c96d959a46", 0x32) 06:44:12 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000f80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40801}, 0x2000c084) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000fc0)="d9e3428dfd0290e61285add935c41009", 0x10) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:12 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r8 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @desc2}, &(0x7f00000006c0)={0x0, "26f8d5f41b47608e12828b5c828d2976b89b99d2f1c6dbb4e078c9d0daa8cf31c5d1ed3db8f66e83181e1e4c9670233d5034b78c970f1c30fc69ea981d29e257", 0x16}, 0x48, r5) keyctl$unlink(0x9, r5, r8) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000740)="7ba8e9c237e28711895db45f97758afe6a6446dea238bbbb3ba22157fe21259e158dcb5a669220fd688b1d4ce9c96d959a46", 0x32) 06:44:12 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) r5 = eventfd2(0x5e9, 0x80000) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000d00)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f0000000840)="4f15b3b1e28921b12b92b794cb9e9f4ad9f9dfb70e61cbe540c9a79f9d98f9687f985d2ed061812e1ce9c3c7a56330d25bb6b9a2a9ab2fb34c5bc1b25ba3ed7e85304cfbfdd345cbc7409166560447ddb7ec0c5d7260c3953d0060b45fd7aedb2ad727214ad97c076a05c53424a8b1dc8ec31aa0c96107685cf317a62e7929e266661a2c4da2a0b78c174b0fdb8e129fccf8bd0a4bc531304f17cae9a0a5c343ea9b2f95be035184467ba833980756e0aa246de426d578f3b785e4a1112fbb16357f8ae8289b13326c215f1b7616658c321b4f65b97d27de93ca46930aacba8ee433e4", 0xe3, 0x8, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x7fff, r1, &(0x7f0000000980)="48fa74e90f30341214bdafb711894b4831482d14ed7f8ad0c0cd482f0e47edd2", 0x20, 0x8, 0x0, 0x1, r5}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000a00)="4d5c4f012a0782aeb0b729791f564ece25e7ece70168a7ef471df510af16471dae35ba08de66c6d47654de6420e1a58675a971e9c5c4ea9c1faf6c7ea3aa4b3424ccedf70480ab6efa539841c3520fffd6f8226abe71bdb749f166a531eb87d0a73805d099b2ac529beb0ebe181e087abd4512c903ab9b266400a24914c9fba77e096f4e7156", 0x86, 0x80000000, 0x0, 0x2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x2, 0x1, r6, &(0x7f0000000b40)="f559bd43f3c61faaafb22ffcb076e971bf141a299787f149836cf7c5d040060dd627f637f962e70e487eac6b5a931f046148fc711a4a94a7b3170ae23d661caa32a8aadc33e9aa13bcd03d9f586e4d9258d5730ad05f4c9fa30d0a1139047f1b19fbef4b03016165bf19f45f6020f66dc380e54f8100051e177f763fcbff0be55498eada391c7f7720ff0d176d3d6638d04c5f684af436981c82b1496beadd9a7ad134d4bb6cb7cc6cb35bd601526fb436d0d146e949e4d994cae3ac9cf14d", 0xbf, 0x9, 0x0, 0x1}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x1, 0x48, r7, &(0x7f0000000c80)="af1db140615d71aa874b35bc79d75f889b17904a9a609ff70b97bac91813c15ed7a1689c6636204bccd125", 0x2b, 0x7, 0x0, 0x1}]) getgid() keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:44:12 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000f80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40801}, 0x2000c084) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000fc0)="d9e3428dfd0290e61285add935c41009", 0x10) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:12 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r8 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @desc2}, &(0x7f00000006c0)={0x0, "26f8d5f41b47608e12828b5c828d2976b89b99d2f1c6dbb4e078c9d0daa8cf31c5d1ed3db8f66e83181e1e4c9670233d5034b78c970f1c30fc69ea981d29e257", 0x16}, 0x48, r5) keyctl$unlink(0x9, r5, r8) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000740)="7ba8e9c237e28711895db45f97758afe6a6446dea238bbbb3ba22157fe21259e158dcb5a669220fd688b1d4ce9c96d959a46", 0x32) 06:44:13 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000f80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40801}, 0x2000c084) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000fc0)="d9e3428dfd0290e61285add935c41009", 0x10) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:13 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r8 = add_key$fscrypt_v1(&(0x7f0000000640), &(0x7f0000000680)={'fscrypt:', @desc2}, &(0x7f00000006c0)={0x0, "26f8d5f41b47608e12828b5c828d2976b89b99d2f1c6dbb4e078c9d0daa8cf31c5d1ed3db8f66e83181e1e4c9670233d5034b78c970f1c30fc69ea981d29e257", 0x16}, 0x48, r5) keyctl$unlink(0x9, r5, r8) 06:44:30 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_STAT_ANY(r5, 0xf, &(0x7f0000000580)=""/114) shmctl$SHM_LOCK(r5, 0xb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640)='\x00') 06:44:30 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)=0x0) r5 = eventfd2(0x9, 0x0) io_cancel(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000a40)="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", 0xfb, 0x800, 0x0, 0x0, r5}, &(0x7f0000000b80)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f0000000c00)=0xde, 0x4) 06:44:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$negate(0xd, r4, 0x4, 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001980), &(0x7f00000019c0)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$reject(0x13, r1, 0x3, 0x2, r8) 06:44:30 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x3f, 0x80, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x7, 0x7800}}) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000800)={'vlan0\x00', @ifru_addrs=@nfc}) 06:44:30 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) r5 = eventfd2(0x5e9, 0x80000) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000d00)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f0000000840)="4f15b3b1e28921b12b92b794cb9e9f4ad9f9dfb70e61cbe540c9a79f9d98f9687f985d2ed061812e1ce9c3c7a56330d25bb6b9a2a9ab2fb34c5bc1b25ba3ed7e85304cfbfdd345cbc7409166560447ddb7ec0c5d7260c3953d0060b45fd7aedb2ad727214ad97c076a05c53424a8b1dc8ec31aa0c96107685cf317a62e7929e266661a2c4da2a0b78c174b0fdb8e129fccf8bd0a4bc531304f17cae9a0a5c343ea9b2f95be035184467ba833980756e0aa246de426d578f3b785e4a1112fbb16357f8ae8289b13326c215f1b7616658c321b4f65b97d27de93ca46930aacba8ee433e4", 0xe3, 0x8, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x7fff, r1, &(0x7f0000000980)="48fa74e90f30341214bdafb711894b4831482d14ed7f8ad0c0cd482f0e47edd2", 0x20, 0x8, 0x0, 0x1, r5}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000a00)="4d5c4f012a0782aeb0b729791f564ece25e7ece70168a7ef471df510af16471dae35ba08de66c6d47654de6420e1a58675a971e9c5c4ea9c1faf6c7ea3aa4b3424ccedf70480ab6efa539841c3520fffd6f8226abe71bdb749f166a531eb87d0a73805d099b2ac529beb0ebe181e087abd4512c903ab9b266400a24914c9fba77e096f4e7156", 0x86, 0x80000000, 0x0, 0x2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x2, 0x1, r6, &(0x7f0000000b40)="f559bd43f3c61faaafb22ffcb076e971bf141a299787f149836cf7c5d040060dd627f637f962e70e487eac6b5a931f046148fc711a4a94a7b3170ae23d661caa32a8aadc33e9aa13bcd03d9f586e4d9258d5730ad05f4c9fa30d0a1139047f1b19fbef4b03016165bf19f45f6020f66dc380e54f8100051e177f763fcbff0be55498eada391c7f7720ff0d176d3d6638d04c5f684af436981c82b1496beadd9a7ad134d4bb6cb7cc6cb35bd601526fb436d0d146e949e4d994cae3ac9cf14d", 0xbf, 0x9, 0x0, 0x1}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x1, 0x48, r7, &(0x7f0000000c80)="af1db140615d71aa874b35bc79d75f889b17904a9a609ff70b97bac91813c15ed7a1689c6636204bccd125", 0x2b, 0x7, 0x0, 0x1}]) getgid() keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:44:30 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r6, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:44:30 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0)={0xffffffffffffffff}, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000f80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f40)={&(0x7f0000000ec0)={0x64, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40801}, 0x2000c084) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:30 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) keyctl$unlink(0x9, r5, 0x0) 06:44:30 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) setfsgid(r4) keyctl$unlink(0x9, r5, 0x0) 06:44:30 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0), 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000e80)={'syztnl2\x00', &(0x7f0000000e00)={'ip6gre0\x00', r4, 0x2f, 0x3, 0x20, 0x1, 0x24, @private2, @loopback, 0x20, 0x7800, 0x9, 0x1}}) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:30 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$negate(0xd, r4, 0x4, 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001980), &(0x7f00000019c0)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$reject(0x13, r1, 0x3, 0x2, r8) 06:44:43 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_STAT_ANY(r5, 0xf, &(0x7f0000000580)=""/114) shmctl$SHM_LOCK(r5, 0xb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640)='\x00') 06:44:43 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) r5 = eventfd2(0x5e9, 0x80000) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000d00)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f0000000840)="4f15b3b1e28921b12b92b794cb9e9f4ad9f9dfb70e61cbe540c9a79f9d98f9687f985d2ed061812e1ce9c3c7a56330d25bb6b9a2a9ab2fb34c5bc1b25ba3ed7e85304cfbfdd345cbc7409166560447ddb7ec0c5d7260c3953d0060b45fd7aedb2ad727214ad97c076a05c53424a8b1dc8ec31aa0c96107685cf317a62e7929e266661a2c4da2a0b78c174b0fdb8e129fccf8bd0a4bc531304f17cae9a0a5c343ea9b2f95be035184467ba833980756e0aa246de426d578f3b785e4a1112fbb16357f8ae8289b13326c215f1b7616658c321b4f65b97d27de93ca46930aacba8ee433e4", 0xe3, 0x8, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x7fff, r1, &(0x7f0000000980)="48fa74e90f30341214bdafb711894b4831482d14ed7f8ad0c0cd482f0e47edd2", 0x20, 0x8, 0x0, 0x1, r5}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000a00)="4d5c4f012a0782aeb0b729791f564ece25e7ece70168a7ef471df510af16471dae35ba08de66c6d47654de6420e1a58675a971e9c5c4ea9c1faf6c7ea3aa4b3424ccedf70480ab6efa539841c3520fffd6f8226abe71bdb749f166a531eb87d0a73805d099b2ac529beb0ebe181e087abd4512c903ab9b266400a24914c9fba77e096f4e7156", 0x86, 0x80000000, 0x0, 0x2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x2, 0x1, r6, &(0x7f0000000b40)="f559bd43f3c61faaafb22ffcb076e971bf141a299787f149836cf7c5d040060dd627f637f962e70e487eac6b5a931f046148fc711a4a94a7b3170ae23d661caa32a8aadc33e9aa13bcd03d9f586e4d9258d5730ad05f4c9fa30d0a1139047f1b19fbef4b03016165bf19f45f6020f66dc380e54f8100051e177f763fcbff0be55498eada391c7f7720ff0d176d3d6638d04c5f684af436981c82b1496beadd9a7ad134d4bb6cb7cc6cb35bd601526fb436d0d146e949e4d994cae3ac9cf14d", 0xbf, 0x9, 0x0, 0x1}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x1, 0x48, r7, &(0x7f0000000c80)="af1db140615d71aa874b35bc79d75f889b17904a9a609ff70b97bac91813c15ed7a1689c6636204bccd125", 0x2b, 0x7, 0x0, 0x1}]) getgid() keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:44:43 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r6, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:44:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$negate(0xd, r4, 0x4, 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f0000001980), &(0x7f00000019c0)={'syz', 0x0}, 0x0, 0x0, r6) keyctl$reject(0x13, r1, 0x3, 0x2, r8) 06:44:43 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) pipe2(&(0x7f00000009c0), 0x80800) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:43 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000540)="d630c90fd0b818a3dbfd7c3c4c485789b12305fde7de683fbf817e385b7320dfd3e08462720e9f5f7e37e6cf48e4c843d9be9d644d532a2d82382a0d5549adca619858d8436ab42301f3483d922f3e3071905ecfe34f0bc01d44959b119f293a6219968a95bd3f200b9d760d68b45896691dd4caea0fbb36fbb61a153aa55b7d00658e08ffa83ed25aa3eddb87a12833fb5bca7901d9082a4a0f51cda96a71199ed3e8cd3e8719fdb67088bf2229090baa96060c644a728440c7c22f7ad47265c1f982ce15b869a0cad3e2bf4a5544a2823bd673fb4b2500e86a8023b2a2b10a567e9abfdbc3f983e70de0f61b5b4b692fd55ec015cfda", 0xf7) keyctl$unlink(0x9, r5, 0x0) 06:44:43 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)=0x0) r5 = eventfd2(0x9, 0x0) io_cancel(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000a40)="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", 0xfb, 0x800, 0x0, 0x0, r5}, &(0x7f0000000b80)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f0000000c00)=0xde, 0x4) 06:44:43 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x3f, 0x80, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x7, 0x7800}}) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000800)={'vlan0\x00', @ifru_addrs=@nfc}) 06:44:43 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$negate(0xd, r4, 0x4, 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:44:58 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_STAT_ANY(r5, 0xf, &(0x7f0000000580)=""/114) shmctl$SHM_LOCK(r5, 0xb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640)='\x00') 06:44:58 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) r6 = eventfd2(0x10000, 0x1) r7 = epoll_create1(0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000500)={0x4, 0x0, &(0x7f00000004c0)=[r6, r7]}, 0x2) keyctl$unlink(0x9, r5, 0x0) 06:44:58 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) r5 = eventfd2(0x5e9, 0x80000) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f0000000d00)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x6, r4, &(0x7f0000000840)="4f15b3b1e28921b12b92b794cb9e9f4ad9f9dfb70e61cbe540c9a79f9d98f9687f985d2ed061812e1ce9c3c7a56330d25bb6b9a2a9ab2fb34c5bc1b25ba3ed7e85304cfbfdd345cbc7409166560447ddb7ec0c5d7260c3953d0060b45fd7aedb2ad727214ad97c076a05c53424a8b1dc8ec31aa0c96107685cf317a62e7929e266661a2c4da2a0b78c174b0fdb8e129fccf8bd0a4bc531304f17cae9a0a5c343ea9b2f95be035184467ba833980756e0aa246de426d578f3b785e4a1112fbb16357f8ae8289b13326c215f1b7616658c321b4f65b97d27de93ca46930aacba8ee433e4", 0xe3, 0x8, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x7fff, r1, &(0x7f0000000980)="48fa74e90f30341214bdafb711894b4831482d14ed7f8ad0c0cd482f0e47edd2", 0x20, 0x8, 0x0, 0x1, r5}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000a00)="4d5c4f012a0782aeb0b729791f564ece25e7ece70168a7ef471df510af16471dae35ba08de66c6d47654de6420e1a58675a971e9c5c4ea9c1faf6c7ea3aa4b3424ccedf70480ab6efa539841c3520fffd6f8226abe71bdb749f166a531eb87d0a73805d099b2ac529beb0ebe181e087abd4512c903ab9b266400a24914c9fba77e096f4e7156", 0x86, 0x80000000, 0x0, 0x2}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x2, 0x1, r6, &(0x7f0000000b40)="f559bd43f3c61faaafb22ffcb076e971bf141a299787f149836cf7c5d040060dd627f637f962e70e487eac6b5a931f046148fc711a4a94a7b3170ae23d661caa32a8aadc33e9aa13bcd03d9f586e4d9258d5730ad05f4c9fa30d0a1139047f1b19fbef4b03016165bf19f45f6020f66dc380e54f8100051e177f763fcbff0be55498eada391c7f7720ff0d176d3d6638d04c5f684af436981c82b1496beadd9a7ad134d4bb6cb7cc6cb35bd601526fb436d0d146e949e4d994cae3ac9cf14d", 0xbf, 0x9, 0x0, 0x1}, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x1, 0x48, r7, &(0x7f0000000c80)="af1db140615d71aa874b35bc79d75f889b17904a9a609ff70b97bac91813c15ed7a1689c6636204bccd125", 0x2b, 0x7, 0x0, 0x1}]) keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:44:58 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r6, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:44:58 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x3f, 0x80, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x7, 0x7800}}) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000800)={'vlan0\x00', @ifru_addrs=@nfc}) 06:44:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) request_key(&(0x7f00000018c0)='asymmetric\x00', &(0x7f0000001900)={'syz', 0x1}, &(0x7f0000001940)='fscrypt:', r0) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:44:58 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)=0x0) r5 = eventfd2(0x9, 0x0) io_cancel(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000a40)="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", 0xfb, 0x800, 0x0, 0x0, r5}, &(0x7f0000000b80)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f0000000c00)=0xde, 0x4) 06:44:58 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000740)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:58 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_STAT_ANY(r5, 0xf, &(0x7f0000000580)=""/114) shmctl$SHM_LOCK(r5, 0xb) 06:44:58 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x29, 0x6, 0x1, 0x28, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x79c0, 0x8000, 0x40, 0x2}}) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:58 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000580)) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:44:58 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000500)=""/110) shmctl$SHM_LOCK(r5, 0xb) 06:44:58 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) eventfd2(0x10000, 0x1) epoll_create1(0x0) keyctl$unlink(0x9, r5, 0x0) 06:44:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) r7 = add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$search(0xa, r5, &(0x7f0000001700)='id_resolver\x00', &(0x7f0000001740)={'syz', 0x1}, r7) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:44:58 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x24, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:11 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) eventfd2(0x5e9, 0x80000) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:45:11 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) eventfd2(0x10000, 0x1) keyctl$unlink(0x9, r5, 0x0) 06:45:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) add_key(&(0x7f0000001780)='big_key\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="2673ff88e6e1925e03bfc56b1b872afc9fa1be204a46beeb61a9fa75a6b6e1cf457d201f2161002c5a9e17fc04f17f3f4f7ca62828e29b4baed00433706ab19818a274e8e7975fa91158dbfae8238510e4e870f943f8db1bf3fb07cf24434fa0a4c0d14590d0eec9334c4fec176195638c108224b6901914953109e82462fa05fa5e007c4326ff8812c9ed7435debd4d079b2f6ac6c26e4f6eee08aeab5eae10804350c5cbcab1e288e4ebc6d25367ae0b025796", 0xb4, r4) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:11 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:45:11 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) syz_genetlink_get_family_id$batadv(&(0x7f0000000480), r1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:11 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) keyctl$search(0xa, r6, &(0x7f0000000480)='rxrpc_s\x00', &(0x7f00000004c0)={'syz', 0x2}, r3) shmctl$SHM_LOCK(r5, 0xb) 06:45:11 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000000780)={'syztnl2\x00', &(0x7f0000000700)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x3f, 0x80, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @loopback, 0x7, 0x7800}}) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) 06:45:11 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)=0x0) r5 = eventfd2(0x9, 0x0) io_cancel(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000a40)="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", 0xfb, 0x800, 0x0, 0x0, r5}, &(0x7f0000000b80)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) 06:45:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) r5 = add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$link(0x8, r5, r6) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:11 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmat(r5, &(0x7f0000ffb000/0x4000)=nil, 0x1000) shmctl$SHM_LOCK(r5, 0xb) 06:45:11 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000400)) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:11 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) request_key(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\x00', 0xfffffffffffffffe) keyctl$unlink(0x9, r5, 0x0) 06:45:11 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$chown(0x4, r5, r3, r4) keyctl$unlink(0x9, r5, 0x0) 06:45:11 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) add_key(&(0x7f0000001600)='big_key\x00', &(0x7f0000001640)={'syz', 0x1}, &(0x7f0000001680)="bd7a55bd575c2458f90c105568ecc1b4c642e73fe9b7b1ed28e3d003cb9b788a400ff61f7e099013090a97593f37d0e34ebc170506955fc447377b36426cfec03d4618351746f4c9198296053bb143e8dfc10b66b7a857e05451f4d8849310daa39f8f06c4d58a2fba1995f6fe14c63a14d79ea373715c4c76e42f19ae2f89", 0x7f, 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:11 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000400)=""/126) shmctl$SHM_LOCK(r5, 0xb) 06:45:11 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) shmctl$SHM_LOCK(0x0, 0xb) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) [ 187.671763] Bluetooth: hci0: command 0x0406 tx timeout [ 187.671791] Bluetooth: hci3: command 0x0406 tx timeout [ 187.672212] Bluetooth: hci1: command 0x0406 tx timeout [ 187.673010] Bluetooth: hci7: command 0x0406 tx timeout [ 187.673388] Bluetooth: hci6: command 0x0406 tx timeout [ 187.674207] Bluetooth: hci5: command 0x0406 tx timeout [ 187.674570] Bluetooth: hci4: command 0x0406 tx timeout [ 189.719728] INFO: task rcu_gp:3 blocked for more than 143 seconds. [ 189.720493] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.720988] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.721669] task:rcu_gp state:I stack:30328 pid:3 ppid:2 flags:0x00004000 [ 189.722302] Call Trace: [ 189.722499] [ 189.722700] __schedule+0x893/0x2470 [ 189.723009] ? io_schedule_timeout+0x150/0x150 [ 189.723395] ? do_raw_spin_lock+0x121/0x260 [ 189.723930] ? rwlock_bug.part.0+0x90/0x90 [ 189.724269] schedule+0xda/0x1b0 [ 189.725003] rescuer_thread+0x851/0xdb0 [ 189.725321] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.725715] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.726406] ? lockdep_hardirqs_on+0x79/0x100 [ 189.726793] ? worker_thread+0x1260/0x1260 [ 189.727140] kthread+0x2ed/0x3a0 [ 189.727432] ? kthread_complete_and_exit+0x40/0x40 [ 189.727841] ret_from_fork+0x22/0x30 [ 189.728158] [ 189.728352] INFO: task rcu_par_gp:4 blocked for more than 143 seconds. [ 189.728882] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.729293] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.729901] task:rcu_par_gp state:I stack:30944 pid:4 ppid:2 flags:0x00004000 [ 189.730548] Call Trace: [ 189.730769] [ 189.730954] __schedule+0x893/0x2470 [ 189.731272] ? io_schedule_timeout+0x150/0x150 [ 189.731660] ? do_raw_spin_lock+0x121/0x260 [ 189.732008] ? rwlock_bug.part.0+0x90/0x90 [ 189.732348] schedule+0xda/0x1b0 [ 189.732646] rescuer_thread+0x851/0xdb0 [ 189.732965] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.733357] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.733769] ? lockdep_hardirqs_on+0x79/0x100 [ 189.734139] ? worker_thread+0x1260/0x1260 [ 189.734479] kthread+0x2ed/0x3a0 [ 189.734779] ? kthread_complete_and_exit+0x40/0x40 [ 189.735174] ret_from_fork+0x22/0x30 [ 189.735505] [ 189.735713] INFO: task slub_flushwq:5 blocked for more than 143 seconds. [ 189.736221] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.736649] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.737239] task:slub_flushwq state:I stack:30944 pid:5 ppid:2 flags:0x00004000 [ 189.737905] Call Trace: [ 189.738109] [ 189.738294] __schedule+0x893/0x2470 [ 189.738606] ? io_schedule_timeout+0x150/0x150 [ 189.738986] ? do_raw_spin_lock+0x121/0x260 [ 189.739335] ? rwlock_bug.part.0+0x90/0x90 [ 189.739691] schedule+0xda/0x1b0 [ 189.739970] rescuer_thread+0x851/0xdb0 [ 189.740288] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.740695] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.741089] ? lockdep_hardirqs_on+0x79/0x100 [ 189.741450] ? worker_thread+0x1260/0x1260 [ 189.741800] kthread+0x2ed/0x3a0 [ 189.742070] ? kthread_complete_and_exit+0x40/0x40 [ 189.742466] ret_from_fork+0x22/0x30 [ 189.742791] [ 189.742975] INFO: task netns:6 blocked for more than 143 seconds. [ 189.743463] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.743898] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.744487] task:netns state:I stack:30944 pid:6 ppid:2 flags:0x00004000 [ 189.745158] Call Trace: [ 189.745361] [ 189.745546] __schedule+0x893/0x2470 [ 189.745863] ? io_schedule_timeout+0x150/0x150 [ 189.746228] ? do_raw_spin_lock+0x121/0x260 [ 189.746572] ? rwlock_bug.part.0+0x90/0x90 [ 189.746933] schedule+0xda/0x1b0 [ 189.747204] rescuer_thread+0x851/0xdb0 [ 189.747533] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.747955] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.748351] ? lockdep_hardirqs_on+0x79/0x100 [ 189.748724] ? worker_thread+0x1260/0x1260 [ 189.749060] kthread+0x2ed/0x3a0 [ 189.749335] ? kthread_complete_and_exit+0x40/0x40 [ 189.749740] ret_from_fork+0x22/0x30 [ 189.750048] [ 189.750233] INFO: task kworker/0:0:7 blocked for more than 143 seconds. [ 189.750749] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.751151] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.751768] task:kworker/0:0 state:I stack:29592 pid:7 ppid:2 flags:0x00004000 [ 189.752406] Workqueue: 0x0 (ata_sff) [ 189.752724] Call Trace: [ 189.752930] [ 189.753112] __schedule+0x893/0x2470 [ 189.753416] ? io_schedule_timeout+0x150/0x150 [ 189.753809] schedule+0xda/0x1b0 [ 189.754085] worker_thread+0x15f/0x1260 [ 189.754414] ? process_one_work+0x16a0/0x16a0 [ 189.754782] kthread+0x2ed/0x3a0 [ 189.755053] ? kthread_complete_and_exit+0x40/0x40 [ 189.755447] ret_from_fork+0x22/0x30 [ 189.755782] [ 189.755971] INFO: task kworker/0:0H:8 blocked for more than 143 seconds. [ 189.756474] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.756910] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.757493] task:kworker/0:0H state:I stack:28952 pid:8 ppid:2 flags:0x00004000 [ 189.758160] Workqueue: 0x0 (kblockd) [ 189.758463] Call Trace: [ 189.758681] [ 189.758866] __schedule+0x893/0x2470 [ 189.759167] ? io_schedule_timeout+0x150/0x150 [ 189.759552] schedule+0xda/0x1b0 [ 189.759850] worker_thread+0x15f/0x1260 [ 189.760180] ? process_one_work+0x16a0/0x16a0 [ 189.760537] kthread+0x2ed/0x3a0 [ 189.760833] ? kthread_complete_and_exit+0x40/0x40 [ 189.761213] ret_from_fork+0x22/0x30 [ 189.761525] [ 189.761731] INFO: task mm_percpu_wq:10 blocked for more than 143 seconds. [ 189.762241] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.762662] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.763248] task:mm_percpu_wq state:I stack:30944 pid:10 ppid:2 flags:0x00004000 [ 189.763915] Call Trace: [ 189.764124] [ 189.764304] __schedule+0x893/0x2470 [ 189.764603] ? io_schedule_timeout+0x150/0x150 [ 189.764983] ? do_raw_spin_lock+0x121/0x260 [ 189.765327] ? rwlock_bug.part.0+0x90/0x90 [ 189.765685] schedule+0xda/0x1b0 [ 189.765961] rescuer_thread+0x851/0xdb0 [ 189.766278] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.766686] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.767081] ? lockdep_hardirqs_on+0x79/0x100 [ 189.767449] ? worker_thread+0x1260/0x1260 [ 189.767802] kthread+0x2ed/0x3a0 [ 189.768076] ? kthread_complete_and_exit+0x40/0x40 [ 189.768458] ret_from_fork+0x22/0x30 [ 189.768792] [ 189.768981] INFO: task rcu_tasks_kthre:11 blocked for more than 143 seconds. [ 189.769520] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.769950] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.770534] task:rcu_tasks_kthre state:I stack:29272 pid:11 ppid:2 flags:0x00004000 [ 189.771183] Call Trace: [ 189.771399] [ 189.771581] __schedule+0x893/0x2470 [ 189.771907] ? io_schedule_timeout+0x150/0x150 [ 189.772270] ? mark_held_locks+0x9e/0xe0 [ 189.772590] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 189.773005] schedule+0xda/0x1b0 [ 189.773279] rcu_tasks_one_gp+0x3db/0xc10 [ 189.773646] rcu_tasks_kthread+0x80/0xa0 [ 189.773970] ? rcu_tasks_postscan+0x10/0x10 [ 189.774305] kthread+0x2ed/0x3a0 [ 189.774571] ? kthread_complete_and_exit+0x40/0x40 [ 189.774975] ret_from_fork+0x22/0x30 [ 189.775290] [ 189.775481] INFO: task kworker/1:0:20 blocked for more than 143 seconds. [ 189.775999] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.776410] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.777017] task:kworker/1:0 state:I stack:29760 pid:20 ppid:2 flags:0x00004000 [ 189.777673] Workqueue: 0x0 (rcu_gp) [ 189.777972] Call Trace: [ 189.778169] [ 189.778350] __schedule+0x893/0x2470 [ 189.778670] ? io_schedule_timeout+0x150/0x150 [ 189.779040] schedule+0xda/0x1b0 [ 189.779326] worker_thread+0x15f/0x1260 [ 189.779671] ? process_one_work+0x16a0/0x16a0 [ 189.780028] kthread+0x2ed/0x3a0 [ 189.780300] ? kthread_complete_and_exit+0x40/0x40 [ 189.780702] ret_from_fork+0x22/0x30 [ 189.781012] [ 189.781196] INFO: task kworker/1:0H:21 blocked for more than 143 seconds. [ 189.781724] Not tainted 6.0.0-rc7-next-20220930 #1 [ 189.782129] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 189.782724] task:kworker/1:0H state:I stack:29760 pid:21 ppid:2 flags:0x00004000 [ 189.783362] Workqueue: 0x0 (events_highpri) [ 189.783731] Call Trace: [ 189.783934] [ 189.784115] __schedule+0x893/0x2470 [ 189.784420] ? io_schedule_timeout+0x150/0x150 [ 189.784806] schedule+0xda/0x1b0 [ 189.785082] worker_thread+0x15f/0x1260 [ 189.785401] ? process_one_work+0x16a0/0x16a0 [ 189.785781] kthread+0x2ed/0x3a0 [ 189.786051] ? kthread_complete_and_exit+0x40/0x40 [ 189.786443] ret_from_fork+0x22/0x30 [ 189.786768] [ 189.787003] [ 189.787003] Showing all locks held in the system: [ 189.787486] 1 lock held by rcu_tasks_kthre/11: [ 189.787852] #0: ffffffff85406850 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc10 [ 189.788590] 1 lock held by khungtaskd/25: [ 189.788925] #0: ffffffff85407320 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 189.789619] 1 lock held by in:imklog/198: [ 189.789959] #0: ffff88800d30d768 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 [ 189.790604] 2 locks held by syz-executor/4187: [ 189.790970] [ 189.791105] ============================================= [ 189.791105] [ 191.767865] Bluetooth: hci2: command 0x0406 tx timeout 06:45:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) add_key$keyring(&(0x7f0000001580), &(0x7f00000015c0)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:25 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ptrace$setopts(0x4206, 0xffffffffffffffff, 0xfd, 0x3) ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) 06:45:25 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) r5 = request_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) keyctl$unlink(0x9, r5, 0x0) 06:45:25 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:45:25 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)) eventfd2(0x9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) 06:45:26 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) setsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000300)="16097e0defbf48d9b045e3f25a0e81d57833ed0a4227c5184a40aca8e2aae763a11653912385527bf2a6b461cfcf86854c7eb01da9f5ad5b53bb2a53c309b04f3a2a5779432ea69db792b4e53025000412ddd416f12cda56b669c123ba95c4e9b0e974eb117649fba0f68018220a2eaaa19bd0d7c99e09531fec5ce3d86a08062d5c8fa67a6fa487864253ae87f52e4eceaf5862c9e15770149569c62e054c045fd3a7a1c4d8032672bf7d59b2372e36112e7bebc9c7870edc90c0d551846edce31d7f304a4338f2636eee5d2fd08b163775bcf8d55888be062716234bdf93657ad37865230f", 0xe6) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:26 executing program 6: rt_sigaction(0x8, &(0x7f0000000080)={&(0x7f0000000000)="c4637d198114980000f3c4c1a5dfe56442dce041dda303000000c4a27918fff0458311b28fc810a39e0010c0fe0ef20fd6cbdbe38fe8188554254dae", 0x0, &(0x7f0000000040)="c461f97ef126430fb164ed00f2400f1b3ec4a3f9619df7ffffff000f9e31ff91335c0000c4617bf00145d2bafd078041c44271935cdc93470f56943bdb174a5d", {[0x40]}}, &(0x7f0000000140)={&(0x7f00000000c0)="646636f30f595e0164f3a5c4e3516c0eb5643e66660fef83d9eb52c8460f01c1c4c231be12f30fa7e8c4e12df28c0f080000003e6dc4e2350cda", 0x0, &(0x7f0000000100)="f3400f01ea42d9fb363e64f0453077f3cf440fa5b1f50000000f71e649c441fa167ffe41f6f9c42171d06e00c401fe1135feefffff"}, 0x8, &(0x7f0000000180)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1f, &(0x7f0000000240), 0x8) r0 = request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = epoll_create(0x2) epoll_pwait2(r1, &(0x7f0000000340)=[{}, {}], 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0x1]}, 0x8) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000400)) rt_sigaction(0xe, &(0x7f00000004c0)={&(0x7f0000000440)="36260feaf766400f3822ef66460f62b9e0000000420d00000021c421de5389001000006442dd546e74f3670f015070c4212dd949f443d9f440d9ea", 0x2, &(0x7f0000000480)="40d9f4c4221128ebc481f95b34b9d9f03b3bc44295ac500ac44279dbca440fae5b878f69d001dcc421ff2c1500100000", {[0x401]}}, &(0x7f00000005c0)={&(0x7f0000000500)="a2000000000000000026660f1a820c000000f20f5e65000f1a16c4237d082d00000000d7420fb25e00c4217e123166400f666b0b440f18cec4e3f916af5f00000035", 0x0, &(0x7f0000000580)="660f381c2226f0431855a50f0d9300000000f30faedb43c1a5f4ffffff353647dd044ac4c27d1879007b0c0f0f4ebfbbf342af"}, 0x8, &(0x7f0000000600)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000640)={0x4}) r3 = add_key$fscrypt_v1(&(0x7f0000000680), &(0x7f00000006c0)={'fscrypt:', @desc4}, &(0x7f0000000700)={0x0, "aa54d75af1e172b59baa7790330209e049652c4009c92226a8a6ffb114e88897324dde76caeb30121af34a2c094d470b09c18dff3f74c3de1ca7c8b4902eeefc", 0x3c}, 0x48, r0) keyctl$search(0xa, r0, &(0x7f0000000780)='encrypted\x00', &(0x7f00000007c0)={'syz', 0x1}, r3) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) eventfd2(0x5e9, 0x80000) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000b00), 0x1, 0x0) keyctl$describe(0x6, r3, &(0x7f0000000d40), 0x0) 06:45:26 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000003c0)=""/41) shmctl$SHM_LOCK(r5, 0xb) 06:45:26 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) r3 = getuid() r4 = getegid() keyctl$chown(0x4, r2, r3, r4) keyctl$unlink(0x9, 0x0, 0x0) 06:45:26 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x2404844c) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r4 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r4, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$link(0x8, r4, r3) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:26 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) keyctl$chown(0x4, r6, 0xee01, 0xffffffffffffffff) shmctl$SHM_LOCK(r5, 0xb) 06:45:26 executing program 4: keyctl$restrict_keyring(0x1d, 0xfffffffffffffff8, &(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)='\x00') r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='{\xef,%!@!--@\'},\'\x00', 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "e096b318de84651efef6e6554ee1d39350df2dad26872a69437bb95baec2766b98cffc276463126c6891982d8b3b2b6cfc4eb859e2970ffbf56abc080c4795cd", 0x1c}, 0x48, 0xfffffffffffffffa) keyctl$link(0x8, r0, r1) request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='--^}\x00[\b+%)-\x00', 0xffffffffffffffff) getuid() getegid() keyctl$unlink(0x9, 0x0, 0x0) 06:45:26 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0x6, 0x2, 0x9, 0x7}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x1000, 0x1f}, 0x14) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000001000)="54eb1a0a0ea4c2814c79e3107d8e85b9cb8ac90f3e4c9d638456fcc6527df227a2eaedec3e5a801bbffdd7e2b765bf4113e5ac8aadf7fefd14ed690a05fe3e2fb5925018e3a06bfe4b41c572e5de46970095f95d6101061fe2a9a83d6dfefbb51151e469fdea") 06:45:26 executing program 0: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/14, 0xe) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/228, 0xe4) unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs2/custom1\x00') shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000001c0)=""/80) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, r3, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000004}, 0x40) clock_getres(0x6, &(0x7f00000003c0)) rt_sigaction(0x2a, &(0x7f0000000480)={&(0x7f0000000400)="65660fd7f12e6766420f5cff67410ffddb8f69e001e546ffc967260f6b591b440f1a082e452c5f9967f3400fae21", 0x1, &(0x7f0000000440)="d9e12e3e0f65041a400fd7d5416d66430fd464290066450f382a49dbc4a1785119c4037915cd0042d35c7b003e3e420f77", {[0x7]}}, &(0x7f00000005c0)={&(0x7f00000004c0)="c482759a9ad2000000c4c3f97db1e5868a83b9410f01eec44111f510c401ed5ca109000000f20f2c7843c441fc50ed8f8a8812c40f00000043ffd166460f38145a00", 0x0, &(0x7f0000000540)="652e2e660fc7f48f8820955900d63e6c8fa9e898016566440f172bc4c2f91e1fc4417a163d0b000000c443c1449c79ae0000000044df56008fa82896b70000008138"}, 0x8, &(0x7f0000000600)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000640)=0x1, 0x4) r4 = socket(0x5, 0x800, 0x1) ioctl$sock_bt_hci(r4, 0x400448e7, &(0x7f0000000680)="3cfada8b3ea2b2bf724c41ba1779f3c6f132c70f7c13bb00c52ae54df33708eab16f755fb7136e7eea28302474f366b9460384435283ec56da6e7f7d7c0f25ac31691bf81b2ff6735d2cb6c3388f5bc7afeb523f18b4137b20b2221653b9") ioctl$sock_ifreq(r1, 0x8938, &(0x7f00000007c0)={'wg0\x00', @ifru_map}) 06:45:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x200000000000, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='syz', r1) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x30, 0xa, 0x203c7242421f857f, 0x30, 0x34, 0x62, 0x66, 0x37, 0x38, 0x61, 0x34, 0x66, 0x38, 0x64, 0x0, 0x32]}, &(0x7f0000000240)={0x0, "1730873916092d11c66230cfef6f53d81199935a6a7a59411f2f808f47660031ee825f8beb17471d561929d9cbc72808b8d0e1509e59555747d91afaf304bcc4", 0x10}, 0x48, r2) eventfd(0x237162c2) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000340)='logon\x00', &(0x7f0000000380)='(/\x00') r3 = request_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x00', r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000480)={r3, 0x1, 0x1000}, &(0x7f00000004c0)={'enc=', 'pkcs1', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000540)=',', &(0x7f0000000580)=""/4096) keyctl$reject(0x13, r1, 0x3, 0x2, 0x0) 06:45:26 executing program 7: ustat(0x9, &(0x7f0000000000)) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)={0x3, [0xffff, 0x7], 0x8001}, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000080)=0x2, 0x4) modify_ldt$read(0x0, &(0x7f00000000c0)=""/89, 0x59) alarm(0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00', 0x0}) ioctl$sock_bt_hci(0xffffffffffffffff, 0xc0000018, &(0x7f0000000180)="e4dbed832c79f1faf79467050e8ea2d6e5481e36cc74847af415282fa6c492134d8a4e02ccc031f418c09b63e9e6fa9f333da7bba86350bfabb0eab9a544a9f42e5a3a05ab5bc034d15bb7912cd1382ae36de412d6a07332960607cdb124f50e3bf4527ab658f59e383b5521d0e4ed493813b228e80955ad0187a07a74865335a0de148abc9d4273bd7f7e8c078b9ce45d6235d005296be762006e92a28aaa299e7cf0571f29ca37d70801d1a03e9efd6e025b3ce16e57d34bdba2854337d86de2c63cf15eec30bcabe68f608d7f8e3519eebc4dc1c5") getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ieee802154, &(0x7f0000000300)=0x80) r1 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe, &(0x7f00000003c0)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r0, 0x4, 0xad, 0x2, 0x7ff, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @remote}, 0x10, 0x80, 0x6, 0xfd}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000500), r1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000400) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000600), r1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000640), 0x4) socket(0x11, 0x80a, 0x4) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, r4, 0x209, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10000}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x24004150) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000800)) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r3, 0x2, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) 06:45:26 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = shmget(0x1, 0x2000, 0x610, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) r1 = add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="cc6e2dc9c45713b19cbf7b7494acd33e9f54526ed0699bbb9047b982650f17d0610b101e0b3f4bef7dc6e62b96cabed5c6efd09abf78a01b3f7dd349fb892e7f38b6fa3b6d4aabfa11b583a329496852f0ebeaa56202d84e0597fb703b4e3f56a7eb185588a11b48f0c221212a68a7dbe39d19e54b428f2253d85e0992f67e4d5fd014a11f3a0e610bfc34f83212e0f94b86e83eaa419063fda702ff17fcfe23bdd034395989d3", 0xa7, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='*\\}\x00', r1) r3 = add_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r2) r4 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ff9000/0x2000)=nil) shmat(r4, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r5 = shmget(0x2, 0x3000, 0x4, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f00000002c0)=""/61) request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='.request_key_auth\x00', r3) shmctl$SHM_LOCK(r5, 0xb) 06:45:26 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000140)=0x9fa0, 0x4) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000180)=@rc, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/245, 0xf5}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/167, 0xa7}], 0x6, &(0x7f00000006c0)}, 0x40000140) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000740)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000780)="2714c939b6d60cf12d11870fcfd99dae", 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000007c0)={0x10}) pipe2(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000900)={0x1}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000940)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r2, 0x200, 0x0, 0x7, 0x5}, 0x9) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000980), 0x4) setsockopt$inet6_int(r1, 0x29, 0xcb, &(0x7f00000009c0)=0x4, 0x4) io_setup(0x7fff, &(0x7f0000000a00)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000bc0)={0x80000008}) VM DIAGNOSIS: 06:45:23 Registers: info registers vcpu 0 RAX=ffffffff8153a1d7 RBX=dffffc0000000000 RCX=0000000000000000 RDX=0000000000000000 RSI=ffffffff815379e4 RDI=ffffffff850361e8 RBP=ffff88801893fd28 RSP=ffff88801893fc58 R8 =0000000000000006 R9 =00000000c000003e R10=00000000c000003e R11=0000000000000001 R12=00000000000000a5 R13=ffff88801893fd60 R14=00000000000000a5 R15=ffffc90000659080 RIP=ffffffff81460c30 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3d435bb900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3d42a55350 CR3=000000000f272000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM01=0000000000000000 0000000000000000 3030623438613630 3638616663356134 YMM02=0000000000000000 0000000000000000 3830306234386136 3036386166633561 YMM03=0000000000000000 0000000000000000 2f6c616e72756f6a 2f676f6c2f6e7572 YMM04=0000000000000000 0000000000000000 b198571852e96357 00000000000af320 YMM05=0000000000000000 0000000000000000 d3fdd5f48436fbd7 00000000000aead0 YMM06=0000000000000000 0000000000000000 b5de91252c2940f9 00000000000ae988 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 44495f474f4c5359 530069253d595449 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 2000000000000000 2000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000032 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bb0f1 RDI=ffffffff8765a9a0 RBP=ffffffff8765a960 RSP=ffff88800902f898 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000032 R11=0000000000000001 R12=0000000000000032 R13=ffffffff8765a960 R14=0000000000000010 R15=ffffffff823bb0e0 RIP=ffffffff823bb149 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005602f8835648 CR3=000000001d516000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 00000000ff000000 0000000000000000 YMM01=0000000000000000 0000000000000000 636f6c63006b6165 6c6d656d6b2f6775 YMM02=0000000000000000 0000000000000000 0000000000ffffff ff00000000000000 YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffff000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000