e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 2: openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) socket(0x11, 0xbfd195f760ba95b6, 0x8) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r10, 0x0, 0x0) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) r1 = socket(0x21, 0x80000, 0x80000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'ip6_vti0\x00', r2, 0x2f, 0x5, 0xc6, 0x9, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x20, 0x700, 0x6, 0x657df5a0}}) socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_IOCTL(r0, &(0x7f00000003c0)={0x20, 0x0, 0x0, {0x80000000, 0x4, 0x73e, 0x101}}, 0x20) openat$fuse(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) 03:29:51 executing program 2: socket(0x11, 0xbfd195f760ba95b6, 0x8) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) r1 = socket(0x21, 0x80000, 0x80000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'ip6_vti0\x00', r2, 0x2f, 0x5, 0xc6, 0x9, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x20, 0x700, 0x6, 0x657df5a0}}) socket$nl_generic(0x10, 0x3, 0x10) write$FUSE_IOCTL(r0, &(0x7f00000003c0)={0x20, 0x0, 0x0, {0x80000000, 0x4, 0x73e, 0x101}}, 0x20) 03:29:51 executing program 2: socket(0x0, 0xbfd195f760ba95b6, 0x8) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) r1 = socket(0x21, 0x80000, 0x80000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'ip6_vti0\x00', r2, 0x2f, 0x5, 0xc6, 0x9, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x20, 0x700, 0x6, 0x657df5a0}}) socket$nl_generic(0x10, 0x3, 0x10) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) r1 = socket(0x21, 0x80000, 0x80000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'ip6_vti0\x00', r2, 0x2f, 0x5, 0xc6, 0x9, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x20, 0x700, 0x6, 0x657df5a0}}) 03:29:51 executing program 2: socket(0x0, 0x0, 0x8) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) socket(0x21, 0x80000, 0x80000001) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 2: socket(0x0, 0x0, 0x8) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7ff, 0x4) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) 03:29:51 executing program 2: socket(0x0, 0x0, 0x8) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) 03:29:51 executing program 3: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:51 executing program 2: socket(0x0, 0xbfd195f760ba95b6, 0x0) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:51 executing program 3: openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 2: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 2: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 3: socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 3: socket(0x0, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:51 executing program 2: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:51 executing program 2: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) bpf$MAP_CREATE(0x4, 0x0, 0xfffffffffffffe31) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 3: socket(0x0, 0x80000, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 2: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @private=0xa010100}, @in={0x2, 0x4e22, @rand_addr=0x64010102}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xab33}, @in6={0xa, 0x4e22, 0x80000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fff}], 0x94) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:51 executing program 2: openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x8100, 0x0) socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:51 executing program 3: socket(0x0, 0x80000, 0x80000001) 03:29:51 executing program 2: socket(0x21, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:51 executing program 2: socket(0x0, 0x80000, 0x80000001) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:51 executing program 3: socket(0x21, 0x0, 0x80000001) 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) 03:29:51 executing program 3: socket(0x21, 0x0, 0x0) 03:29:51 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:51 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:52 executing program 2: socket(0x0, 0x80000, 0x80000001) 03:29:52 executing program 3: socket(0x0, 0x80000, 0x80000001) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 03:29:52 executing program 2: socket(0x0, 0x80000, 0x80000001) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: socket(0x21, 0x0, 0x80000001) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 2: socket(0x21, 0x0, 0x0) 03:29:52 executing program 0: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:52 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 0: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:52 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) 03:29:52 executing program 0: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r10, 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r10, 0x0, 0x0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r10, 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) r10 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r10, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 1: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r9, 0x0, 0x0) 03:29:52 executing program 1: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) r9 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r9, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) write$FUSE_LK(r6, &(0x7f0000000500)={0x28, 0x0, 0x0, {{0x1ffe000, 0x2, 0x2, r8}}}, 0x28) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000004a80)={0x1c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=r8}]}]}, 0x1c}], 0x1}, 0x48840) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) read$FUSE(r7, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r5 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r5, 0x2, 0x5, 0x5, 0x2}, 0x48) r6 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r6, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={r4, 0xf5, 0x58}, &(0x7f0000000580)=ANY=[@ANYBLOB="656e633d53b59e8b686173683d6d69636861656c5f6d69632d67656e6572696300"/77], &(0x7f0000000600)="5d3ec699577b6de2e0f52f6343d64b8ca6099ee684fa713aba72db82dbbf08f01f7909e49647600eb96de1c5a25544c8a057173b3fcb7fa09fd0d1cb6985c952051944966f6f65ec11ea2c5201c2d6915167c52b3efcd222ca1e25f7a9a646f5431c9ce91739cf2af08dd992613216e0fee77b878e09c032d15c002c1c75b09e12fa1e775ba9256489e2a697b9a62e808369a8ce38fd4b67c53252d0a53aa528bbb5433bcb0d51ce2bb6b1fe65453a1ed2c8f87ed6891f04a37e38e9b12495c9c22de619373c9bf1210d200c809ad36b860b9dc889ab1a8d2ea920ca20c3e151202f92155ae54b2f958b1d505d5d5557fa03bb9000", &(0x7f0000000700)=""/88) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), 0x0, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r1) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 3: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 03:29:52 executing program 2: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:52 executing program 3: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 03:29:52 executing program 2: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:52 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r1) 03:29:52 executing program 2: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) 03:29:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000004c0)='asymmetric\x00') 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) bpf$MAP_CREATE(0x2, 0x0, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:53 executing program 1: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000480)='.request_key_auth\x00', 0x0) 03:29:53 executing program 3: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 1: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 1: request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 0: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:53 executing program 0: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 1: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) 03:29:53 executing program 0: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r2 = request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7cb861057fd48fa4bbf382cae827403a7b74cb85c1ab0d91c8940e5f3a33a376997cfad0f03b8bd4c1241932e953725a3ebdef3a8fec16222f5ba6d806d82039"}, 0x48, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)='asymmetric\x00') add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c5650da475eaaeadb7d6e6fc87e566fdc4bb92e6a5cdc53ec166bdcbc3b3214b4d3fda5f8e7e832b30e84611250c67a4288dacbe3412efbd257aaf7b03370e5586aa826e70c6037dc4942b526841099ada66a633a090d87bb5c19f0f0532472edffc9ad42cbf8db1809c92a0e726ec2ee8402061c13b651132a39c106417cb2babc466ee376b0a06d20987c409f9cfc0479c8e95ef48e9482756375314e212f812960f047bb00c5e136da529264e49ca530ef0eb8829690e24bdbcb7a08f1a6f7a97487d35038542b15d16cb9e64c45683596758f3e1502ad5e93346bd19c1a7685cde4d509a0cb40648ee65cf7171cfe50781a3a71357", 0xf7, r2) r4 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8000, 0x7d6, 0x7, 0x436, r1, 0x10001, '\x00', 0x0, r4, 0x2, 0x5, 0x5, 0x2}, 0x48) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x140) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x200}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x140) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x140) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x200}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x200}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, r5, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x140) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f", 0xb2, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685d", 0xd0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0xffffffff, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x0) 03:29:53 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r1, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4c", 0xdf, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(0x0, 0xffffffff, 0x0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e5", 0xe6, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e0", 0xea, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e45", 0xec, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x7, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000180), 0x2000, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x1, 0xffff, 0x5, 0x1022, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2, 0xf}, 0x48) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, r1, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r2, 0x1, &(0x7f00000002c0)=[r0, r3, r0, r4, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 3: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r1, 0x1, &(0x7f00000002c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:53 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', 0x0, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:53 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de010", 0x77, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', r0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000080)=""/172) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000080)=""/172) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, r0) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000080)=""/172) bpf$MAP_CREATE(0x3, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000080)=""/172) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:54 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:29:54 executing program 1: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000080)=""/172) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6416058cb5b53060c3d53ff8b4d4f5cac0b22e798642362c35d3534ceeb14a5d585ae0f1c5d3aa7eb75b33b821a0a7e36cab889cfe0709f6f8416352ad957b880f24776e21a5722f46d3dfa5ec21faa0788dcec9c368a327f7dfac707dab38a09e1491325ebd42d3a0f212a5c25f032abb53ede37de0101bbae2c16a71b0ab3d8015301d272f339d73f5199e80fcabcec18129d7c2c6fa09743838459ac7ef757126612b9b50ef32ddba1e9e300d7fc5c79f53d85f9ad93272e538d3ab5d803d8653f9f00be9304437894d644c4b685ddd080b6685bf3bdeea0a5008891d4cf7d03e737f10e58ae076e07e456d", 0xed, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, 0x0, &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x7, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x14}]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x6, &(0x7f0000000000)=@framed={{}, [@exit, @map_fd={0x18, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 2: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:54 executing program 2: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x24, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0xd5, &(0x7f0000000080)=""/213, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:29:54 executing program 0: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:54 executing program 0: read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0x7, 0xa273, 0x7}, 0x10, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) read$hidraw(r0, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 0: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0x55) 03:29:54 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:29:54 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x1, 0x0, &(0x7f0000000300)=[{0x3, 0x4, 0x7, 0xe}], 0x10, 0x2}, 0x90) 03:29:54 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:29:54 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:54 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:54 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 2: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 2: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 2: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 2: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, r2, {0x7f}}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0xffffffff}, 0x4) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffd5) 03:29:55 executing program 2: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, r2, {0x7f}}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0xffffffff}, 0x4) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffd5) 03:29:55 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) ioctl$HIDIOCGRDESCSIZE(r0, 0x80044801, &(0x7f0000000040)) bpf$MAP_CREATE(0x4, 0x0, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) 03:29:55 executing program 2: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, r2, {0x7f}}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0xffffffff}, 0x4) bpf$MAP_CREATE(0x3, 0x0, 0xffffffffffffffd5) 03:29:55 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) ioctl$HIDIOCGRDESCSIZE(r0, 0x80044801, &(0x7f0000000040)) bpf$MAP_CREATE(0x4, 0x0, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) 03:29:55 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, r2, {0x7f}}, 0x18) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0xffffffff}, 0x4) 03:29:55 executing program 2: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) ioctl$HIDIOCGRDESCSIZE(r0, 0x80044801, &(0x7f0000000040)) bpf$MAP_CREATE(0x4, 0x0, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0x0, r2, {0x7f}}, 0x18) 03:29:55 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'syztnl0\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="73797a746e6c32000000000000000000d06a9a18f78b5af33d5011a2e4419915f6aa991375c16134ecabd043c29d75386fb4d99dc00c2c393d2d4d2d777b8e4d1feb4f8312cdb9a6c0a87e412ac71191b4aed25838ab1d2c3d229f2bad2df1fd15a42744e626", @ANYRES32=r2, @ANYBLOB="8000002000000006000000004710001c0067000080299078ac1e0101ac1e01019404000000000000"]}) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:55 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) ioctl$HIDIOCGRDESCSIZE(r0, 0x80044801, &(0x7f0000000040)) bpf$MAP_CREATE(0x4, 0x0, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r2, 0x0, 0x0) 03:29:55 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) ioctl$HIDIOCGRDESCSIZE(r0, 0x80044801, &(0x7f0000000040)) 03:29:55 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'syztnl0\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="73797a746e6c32000000000000000000d06a9a18f78b5af33d5011a2e4419915f6aa991375c16134ecabd043c29d75386fb4d99dc00c2c393d2d4d2d777b8e4d1feb4f8312cdb9a6c0a87e412ac71191b4aed25838ab1d2c3d229f2bad2df1fd15a42744e626", @ANYRES32=r2, @ANYBLOB="8000002000000006000000004710001c0067000080299078ac1e0101ac1e01019404000000000000"]}) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 0: openat$full(0xffffff9c, &(0x7f0000000000), 0x507840, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'syztnl0\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="73797a746e6c32000000000000000000d06a9a18f78b5af33d5011a2e4419915f6aa991375c16134ecabd043c29d75386fb4d99dc00c2c393d2d4d2d777b8e4d1feb4f8312cdb9a6c0a87e412ac71191b4aed25838ab1d2c3d229f2bad2df1fd15a42744e626", @ANYRES32=r2, @ANYBLOB="8000002000000006000000004710001c0067000080299078ac1e0101ac1e01019404000000000000"]}) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:55 executing program 0: openat$full(0xffffff9c, 0x0, 0x507840, 0x0) 03:29:55 executing program 1: r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) write$FUSE_IOCTL(r0, 0x0, 0x0) 03:29:55 executing program 0: openat$full(0xffffff9c, 0x0, 0x0, 0x0) 03:29:55 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:55 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'syztnl0\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="73797a746e6c32000000000000000000d06a9a18f78b5af33d5011a2e4419915f6aa991375c16134ecabd043c29d75386fb4d99dc00c2c393d2d4d2d777b8e4d1feb4f8312cdb9a6c0a87e412ac71191b4aed25838ab1d2c3d229f2bad2df1fd15a42744e626", @ANYRES32=r2, @ANYBLOB="8000002000000006000000004710001c0067000080299078ac1e0101ac1e01019404000000000000"]}) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:55 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x8, "c67f2f6ffba929aebc1661eda0a00ff3f1f2cccd327b730b99b1d38d42db956697f49e37faa975e4c09ccca9bdeabd8fb65e4c6b31222878f54d0f3207df27eb"}) 03:29:56 executing program 0: openat$full(0xffffff9c, 0x0, 0x0, 0x0) 03:29:56 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="a801028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024000400ff0f02040000000c0000ff0105000000ff0142f05991207e07003f780000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c00040001003f20ff00000000000502008000000800203f76000000810009070700000004000840050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000580)={'syztnl0\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="73797a746e6c32000000000000000000d06a9a18f78b5af33d5011a2e4419915f6aa991375c16134ecabd043c29d75386fb4d99dc00c2c393d2d4d2d777b8e4d1feb4f8312cdb9a6c0a87e412ac71191b4aed25838ab1d2c3d229f2bad2df1fd15a42744e626", @ANYRES32=r2, @ANYBLOB="8000002000000006000000004710001c0067000080299078ac1e0101ac1e01019404000000000000"]}) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:56 executing program 0: openat$full(0xffffff9c, 0x0, 0x0, 0x0) 03:29:56 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) r14 = syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x54, r14, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r15}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1ff}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008041}, 0x8000) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:29:56 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:56 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 1) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.212032][ T9273] FAULT_INJECTION: forcing a failure. [ 429.212032][ T9273] name failslab, interval 1, probability 0, space 0, times 0 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 429.216866][ T9273] CPU: 0 PID: 9273 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.221371][ T9273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.225277][ T9273] Call Trace: [ 429.226540][ T9273] [ 429.227618][ T9273] dump_stack_lvl+0x125/0x1b0 [ 429.229310][ T9273] should_fail_ex+0x496/0x5b0 03:29:56 executing program 3: openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.231007][ T9273] should_failslab+0x9/0x20 [ 429.232774][ T9273] __kmem_cache_alloc_node+0x2f7/0x340 [ 429.234738][ T9273] ? tomoyo_realpath_from_path+0xb9/0x710 [ 429.236815][ T9273] ? tomoyo_realpath_from_path+0xb9/0x710 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 429.238866][ T9273] __kmalloc+0x4f/0x100 [ 429.240574][ T9273] tomoyo_realpath_from_path+0xb9/0x710 [ 429.242591][ T9273] ? tomoyo_profile+0x47/0x60 [ 429.244744][ T9273] tomoyo_path_number_perm+0x241/0x580 [ 429.247465][ T9273] ? tomoyo_path_number_perm+0x22e/0x580 [ 429.250138][ T9273] ? tomoyo_execute_permission+0x4a0/0x4a0 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 429.252706][ T9273] ? find_held_lock+0x2d/0x110 [ 429.254699][ T9273] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.256678][ T9273] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.258635][ T9273] ? bit_wait_io_timeout+0x160/0x160 [ 429.260976][ T9273] ? __fget_files+0x272/0x410 [ 429.263071][ T9273] ? __fget_files+0x272/0x410 [ 429.265167][ T9273] security_file_ioctl+0x72/0xb0 [ 429.267347][ T9273] __do_compat_sys_ioctl+0x5d/0x330 [ 429.269636][ T9273] __do_fast_syscall_32+0x61/0xe0 [ 429.271689][ T9273] do_fast_syscall_32+0x33/0x70 [ 429.273491][ T9273] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.275803][ T9273] RIP: 0023:0xf7f82579 [ 429.277322][ T9273] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.284270][ T9273] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 429.287301][ T9273] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 429.290175][ T9273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.293170][ T9273] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 429.296126][ T9273] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 429.298986][ T9273] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.301904][ T9273] [ 429.304471][ T9273] ERROR: Out of memory at tomoyo_realpath_from_path. 03:29:56 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 2) 03:29:56 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="a801028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024000400ff0f02040000000c0000ff0105000000ff0142f05991207e07003f780000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c00040001003f20ff00000000000502008000000800203f76000000810009070700000004000840050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="a801028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024000400ff0f02040000000c0000ff0105000000ff0142f05991207e07003f780000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c00040001003f20ff00000000000502008000000800203f76000000810009070700000004000840050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000001380), r3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @dev, @initdev}, &(0x7f0000001400)=0xc) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 429.405041][ T9295] FAULT_INJECTION: forcing a failure. 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 3: r0 = openat$cuse(0xffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.405041][ T9295] name failslab, interval 1, probability 0, space 0, times 0 [ 429.410472][ T9295] CPU: 0 PID: 9295 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.414210][ T9295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.417849][ T9295] Call Trace: [ 429.419065][ T9295] [ 429.420172][ T9295] dump_stack_lvl+0x125/0x1b0 [ 429.421892][ T9295] should_fail_ex+0x496/0x5b0 [ 429.423605][ T9295] should_failslab+0x9/0x20 [ 429.425258][ T9295] __kmem_cache_alloc_node+0x2f7/0x340 [ 429.427245][ T9295] ? tomoyo_encode2+0x100/0x3d0 [ 429.429028][ T9295] ? tomoyo_encode2+0x100/0x3d0 [ 429.430810][ T9295] __kmalloc+0x4f/0x100 [ 429.432332][ T9295] tomoyo_encode2+0x100/0x3d0 [ 429.434045][ T9295] ? rcu_is_watching+0x12/0xb0 [ 429.435780][ T9295] tomoyo_encode+0x29/0x50 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (fail_nth: 1) [ 429.437440][ T9295] tomoyo_realpath_from_path+0x196/0x710 [ 429.439629][ T9295] tomoyo_path_number_perm+0x241/0x580 [ 429.441608][ T9295] ? tomoyo_path_number_perm+0x22e/0x580 [ 429.443658][ T9295] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 429.443908][ T9300] FAULT_INJECTION: forcing a failure. [ 429.443908][ T9300] name fail_usercopy, interval 1, probability 0, space 0, times 0 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="a801028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024000400ff0f02040000000c0000ff0105000000ff0142f05991207e07003f780000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c00040001003f20ff00000000000502008000000800203f76000000810009070700000004000840050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 429.445754][ T9295] ? find_held_lock+0x2d/0x110 [ 429.445772][ T9295] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.445793][ T9295] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.456333][ T9295] ? bit_wait_io_timeout+0x160/0x160 [ 429.458248][ T9295] ? __fget_files+0x272/0x410 [ 429.459955][ T9295] ? __fget_files+0x272/0x410 [ 429.461678][ T9295] security_file_ioctl+0x72/0xb0 [ 429.463476][ T9295] __do_compat_sys_ioctl+0x5d/0x330 [ 429.465375][ T9295] __do_fast_syscall_32+0x61/0xe0 [ 429.467200][ T9295] do_fast_syscall_32+0x33/0x70 [ 429.468972][ T9295] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.471397][ T9295] RIP: 0023:0xf7f82579 [ 429.472898][ T9295] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.479719][ T9295] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 429.482724][ T9295] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 429.485565][ T9295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.488464][ T9295] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 429.491332][ T9295] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 429.494243][ T9295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.497133][ T9295] [ 429.498272][ T9300] CPU: 1 PID: 9300 Comm: syz-executor.0 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.500186][ T9295] ERROR: Out of memory at tomoyo_realpath_from_path. [ 429.502099][ T9300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.502108][ T9300] Call Trace: [ 429.502112][ T9300] [ 429.502116][ T9300] dump_stack_lvl+0x125/0x1b0 [ 429.502131][ T9300] should_fail_ex+0x496/0x5b0 [ 429.502143][ T9300] _copy_from_user+0x30/0xf0 [ 429.502156][ T9300] __sys_bpf+0x210/0x4d30 [ 429.517368][ T9300] ? ksys_write+0x214/0x250 [ 429.519017][ T9300] ? bpf_perf_link_attach+0x540/0x540 [ 429.521152][ T9300] ? vfs_write+0x14c/0xe40 [ 429.522769][ T9300] ? __mutex_unlock_slowpath+0x165/0x640 [ 429.524817][ T9300] ? bit_wait_io_timeout+0x160/0x160 [ 429.526736][ T9300] ? fput+0x30/0x1a0 [ 429.528188][ T9300] ? ksys_write+0x1a7/0x250 [ 429.530059][ T9300] ? __ia32_sys_read+0xb0/0xb0 [ 429.531794][ T9300] __ia32_sys_bpf+0x76/0xd0 [ 429.533452][ T9300] __do_fast_syscall_32+0x61/0xe0 [ 429.535295][ T9300] do_fast_syscall_32+0x33/0x70 [ 429.537205][ T9300] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.539494][ T9300] RIP: 0023:0xf7f5a579 [ 429.540991][ T9300] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.547852][ T9300] RSP: 002b:00000000f7f555ac EFLAGS: 00000292 ORIG_RAX: 0000000000000165 [ 429.550869][ T9300] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000000000 [ 429.553848][ T9300] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.556787][ T9300] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 429.559678][ T9300] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 429.562539][ T9300] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.565401][ T9300] 03:29:56 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 3) 03:29:56 executing program 3: r0 = openat$cuse(0xffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (fail_nth: 2) [ 429.634780][ T9308] FAULT_INJECTION: forcing a failure. 03:29:56 executing program 3: r0 = openat$cuse(0xffffff9c, 0x0, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.634780][ T9308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.641208][ T9308] CPU: 0 PID: 9308 Comm: syz-executor.0 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.643396][ T9313] FAULT_INJECTION: forcing a failure. [ 429.643396][ T9313] name failslab, interval 1, probability 0, space 0, times 0 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, 0x0) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 429.646011][ T9308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.646025][ T9308] Call Trace: [ 429.646032][ T9308] [ 429.646040][ T9308] dump_stack_lvl+0x125/0x1b0 03:29:56 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.646065][ T9308] should_fail_ex+0x496/0x5b0 [ 429.663714][ T9308] _copy_to_user+0x30/0xb0 [ 429.665950][ T9308] simple_read_from_buffer+0xd0/0x150 [ 429.668462][ T9308] proc_fail_nth_read+0x1b0/0x280 [ 429.670835][ T9308] ? proc_tid_comm_permission+0x1f0/0x1f0 [ 429.673507][ T9308] ? security_file_permission+0xdc/0x100 [ 429.676149][ T9308] ? proc_tid_comm_permission+0x1f0/0x1f0 [ 429.678799][ T9308] vfs_read+0x1ce/0x930 [ 429.680757][ T9308] ? kernel_read+0x1b0/0x1b0 [ 429.682884][ T9308] ? __fget_files+0x272/0x410 [ 429.685049][ T9308] ksys_read+0x12f/0x250 03:29:56 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) [ 429.687016][ T9308] ? vfs_write+0xe40/0xe40 [ 429.689297][ T9308] __do_fast_syscall_32+0x61/0xe0 [ 429.691667][ T9308] do_fast_syscall_32+0x33/0x70 [ 429.693919][ T9308] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.696877][ T9308] RIP: 0023:0xf7f5a579 [ 429.698810][ T9308] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.706055][ T9308] RSP: 002b:00000000f7f555e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 429.709045][ T9308] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000f7f55670 [ 429.712266][ T9308] RDX: 000000000000000f RSI: 00000000f7353ff4 RDI: 0000000000000000 [ 429.715941][ T9308] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 429.719402][ T9308] R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000000 [ 429.722316][ T9308] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.725158][ T9308] [ 429.726284][ T9313] CPU: 3 PID: 9313 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.730620][ T9313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.734703][ T9313] Call Trace: [ 429.736102][ T9313] [ 429.737318][ T9313] dump_stack_lvl+0x125/0x1b0 [ 429.739250][ T9313] should_fail_ex+0x496/0x5b0 [ 429.741201][ T9313] should_failslab+0x9/0x20 [ 429.743066][ T9313] __kmem_cache_alloc_node+0x2f7/0x340 [ 429.745305][ T9313] ? __get_vm_area_node+0xe1/0x3d0 [ 429.747409][ T9313] kmalloc_node_trace+0x22/0xd0 [ 429.749423][ T9313] __get_vm_area_node+0xe1/0x3d0 [ 429.751468][ T9313] __vmalloc_node_range+0x27a/0x1540 [ 429.753643][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.755664][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.757697][ T9313] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.759904][ T9313] ? delayed_vfree_work+0x70/0x70 [ 429.761988][ T9313] ? vsprintf+0x30/0x30 [ 429.763724][ T9313] ? _raw_spin_unlock+0x28/0x40 [ 429.765747][ T9313] ? alloc_fd+0x2da/0x6c0 [ 429.767520][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.769519][ T9313] __vmalloc+0x6d/0x90 [ 429.771210][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.773111][ T9313] kvm_dev_ioctl+0x210/0x1c20 [ 429.774837][ T9313] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.776812][ T9313] ? bit_wait_io_timeout+0x160/0x160 [ 429.778741][ T9313] ? __fget_files+0x272/0x410 [ 429.780470][ T9313] ? kvm_vcpu_stats_release+0x80/0x80 [ 429.782421][ T9313] ? __fget_files+0x272/0x410 [ 429.784153][ T9313] ? bpf_lsm_file_ioctl+0x9/0x10 [ 429.785956][ T9313] ? kvm_vcpu_stats_release+0x80/0x80 [ 429.787901][ T9313] __do_compat_sys_ioctl+0x2bf/0x330 [ 429.789842][ T9313] __do_fast_syscall_32+0x61/0xe0 [ 429.791683][ T9313] do_fast_syscall_32+0x33/0x70 [ 429.793601][ T9313] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.795928][ T9313] RIP: 0023:0xf7f82579 [ 429.797437][ T9313] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.804412][ T9313] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 429.807438][ T9313] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 429.810319][ T9313] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.813277][ T9313] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 429.816224][ T9313] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 429.819129][ T9313] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.822375][ T9313] [ 429.824459][ T9313] syz-executor.1: vmalloc error: size 39320, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 429.830751][ T9313] CPU: 3 PID: 9313 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 429.834626][ T9313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 429.838481][ T9313] Call Trace: [ 429.840102][ T9313] [ 429.841498][ T9313] dump_stack_lvl+0x125/0x1b0 [ 429.843726][ T9313] warn_alloc+0x24a/0x3a0 [ 429.845794][ T9313] ? zone_watermark_ok_safe+0x2e0/0x2e0 [ 429.848415][ T9313] ? __kmem_cache_alloc_node+0x2f7/0x340 [ 429.851083][ T9313] ? __kasan_kmalloc+0x86/0xb0 [ 429.853383][ T9313] ? __get_vm_area_node+0x281/0x3d0 [ 429.855809][ T9313] __vmalloc_node_range+0xc13/0x1540 [ 429.858349][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.860654][ T9313] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.863179][ T9313] ? delayed_vfree_work+0x70/0x70 [ 429.865583][ T9313] ? vsprintf+0x30/0x30 [ 429.867558][ T9313] ? _raw_spin_unlock+0x28/0x40 [ 429.869881][ T9313] ? alloc_fd+0x2da/0x6c0 [ 429.871926][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.874252][ T9313] __vmalloc+0x6d/0x90 [ 429.876238][ T9313] ? kvm_dev_ioctl+0x210/0x1c20 [ 429.878538][ T9313] kvm_dev_ioctl+0x210/0x1c20 [ 429.880754][ T9313] ? reacquire_held_locks+0x4b0/0x4b0 [ 429.883170][ T9313] ? bit_wait_io_timeout+0x160/0x160 [ 429.885608][ T9313] ? __fget_files+0x272/0x410 [ 429.887834][ T9313] ? kvm_vcpu_stats_release+0x80/0x80 [ 429.890365][ T9313] ? __fget_files+0x272/0x410 [ 429.892604][ T9313] ? bpf_lsm_file_ioctl+0x9/0x10 [ 429.894946][ T9313] ? kvm_vcpu_stats_release+0x80/0x80 [ 429.897487][ T9313] __do_compat_sys_ioctl+0x2bf/0x330 [ 429.899976][ T9313] __do_fast_syscall_32+0x61/0xe0 [ 429.902375][ T9313] do_fast_syscall_32+0x33/0x70 [ 429.904640][ T9313] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 429.907590][ T9313] RIP: 0023:0xf7f82579 [ 429.909542][ T9313] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 429.918521][ T9313] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 429.922376][ T9313] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 429.926081][ T9313] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 429.929784][ T9313] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 429.933534][ T9313] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 429.937282][ T9313] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 429.940994][ T9313] [ 429.943781][ T9313] Mem-Info: [ 429.945004][ T9313] active_anon:28128 inactive_anon:896 isolated_anon:0 [ 429.945004][ T9313] active_file:4807 inactive_file:8290 isolated_file:0 [ 429.945004][ T9313] unevictable:768 dirty:18 writeback:0 [ 429.945004][ T9313] slab_reclaimable:6698 slab_unreclaimable:53611 [ 429.945004][ T9313] mapped:12439 shmem:11039 pagetables:452 [ 429.945004][ T9313] sec_pagetables:0 bounce:0 [ 429.945004][ T9313] kernel_misc_reclaimable:0 [ 429.945004][ T9313] free:132751 free_pcp:6456 free_cma:0 [ 429.961872][ T9313] Node 0 active_anon:8140kB inactive_anon:3464kB active_file:488kB inactive_file:1292kB unevictable:1536kB isolated(anon):380kB isolated(file):0kB mapped:22048kB dirty:36kB writeback:0kB shmem:1544kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:9808kB pagetables:1292kB sec_pagetables:0kB all_unreclaimable? no [ 429.973264][ T9313] Node 1 active_anon:104068kB inactive_anon:120kB active_file:18740kB inactive_file:31868kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:27708kB dirty:36kB writeback:0kB shmem:42612kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:1136kB pagetables:516kB sec_pagetables:0kB all_unreclaimable? no [ 429.985076][ T9313] Node 0 DMA free:3128kB boost:0kB min:740kB low:924kB high:1108kB reserved_highatomic:0KB active_anon:348kB inactive_anon:48kB active_file:4kB inactive_file:16kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:208kB local_pcp:12kB free_cma:0kB [ 429.995046][ T9313] lowmem_reserve[]: 0 419 419 419 419 [ 429.997172][ T9313] Node 0 DMA32 free:39464kB boost:0kB min:20732kB low:25912kB high:31092kB reserved_highatomic:0KB active_anon:8136kB inactive_anon:3424kB active_file:492kB inactive_file:1280kB unevictable:1536kB writepending:36kB present:1032192kB managed:433260kB mlocked:0kB bounce:0kB free_pcp:4076kB local_pcp:732kB free_cma:0kB [ 430.008185][ T9313] lowmem_reserve[]: 0 0 0 0 0 [ 430.010034][ T9313] Node 1 DMA32 free:487860kB boost:0kB min:46104kB low:57628kB high:69152kB reserved_highatomic:0KB active_anon:104064kB inactive_anon:120kB active_file:18740kB inactive_file:31868kB unevictable:1536kB writepending:36kB present:1048436kB managed:954416kB mlocked:0kB bounce:0kB free_pcp:22488kB local_pcp:6968kB free_cma:0kB [ 430.021537][ T9313] lowmem_reserve[]: 0 0 0 0 0 [ 430.023450][ T9313] Node 0 DMA: 172*4kB (UME) 69*8kB (UM) 32*16kB (UM) 25*32kB (UME) 5*64kB (UM) 2*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3128kB [ 430.028817][ T9313] Node 0 DMA32: 500*4kB (UME) 569*8kB (UME) 385*16kB (UME) 372*32kB (UME) 134*64kB (UME) 43*128kB (UME) 3*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 39464kB [ 430.034862][ T9313] Node 1 DMA32: 2019*4kB (ME) 3617*8kB (ME) 2478*16kB (UME) 1534*32kB (UME) 1014*64kB (UME) 488*128kB (UME) 235*256kB (UME) 77*512kB (UM) 12*1024kB (M) 10*2048kB (M) 25*4096kB (M) = 487860kB [ 430.041977][ T9313] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 430.045452][ T9313] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 430.048731][ T9313] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 430.052458][ T9313] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 430.055941][ T9313] 31411 total pagecache pages [ 430.057818][ T9313] 7263 pages in swap cache [ 430.059534][ T9313] Free swap = 80312kB [ 430.061170][ T9313] Total swap = 124996kB [ 430.062712][ T9313] 524155 pages RAM [ 430.064188][ T9313] 0 pages HighMem/MovableOnly [ 430.065895][ T9313] 173396 pages reserved [ 430.067389][ T9313] 0 pages cma reserved 03:29:56 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r11, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r12, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:29:56 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 4) 03:29:56 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x90) 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r11, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 430.095883][ T9329] FAULT_INJECTION: forcing a failure. 03:29:56 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 430.095883][ T9329] name failslab, interval 1, probability 0, space 0, times 0 [ 430.100852][ T9329] CPU: 2 PID: 9329 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 430.104611][ T9329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 430.108257][ T9329] Call Trace: [ 430.109495][ T9329] [ 430.110615][ T9329] dump_stack_lvl+0x125/0x1b0 [ 430.112351][ T9329] should_fail_ex+0x496/0x5b0 [ 430.114074][ T9329] should_failslab+0x9/0x20 03:29:56 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r11, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 430.115924][ T9329] kmem_cache_alloc_node+0x384/0x3f0 [ 430.118020][ T9329] ? alloc_vmap_area+0x1af/0x2060 [ 430.120015][ T9329] alloc_vmap_area+0x1af/0x2060 [ 430.121845][ T9329] ? free_vmap_area+0x1c40/0x1c40 [ 430.123693][ T9329] __get_vm_area_node+0x132/0x3d0 [ 430.125552][ T9329] __vmalloc_node_range+0x27a/0x1540 [ 430.127840][ T9329] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.130149][ T9329] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.132331][ T9329] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.134715][ T9329] ? delayed_vfree_work+0x70/0x70 [ 430.136965][ T9329] ? vsprintf+0x30/0x30 [ 430.138803][ T9329] ? _raw_spin_unlock+0x28/0x40 [ 430.141014][ T9329] ? alloc_fd+0x2da/0x6c0 [ 430.142899][ T9329] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.144669][ T9329] __vmalloc+0x6d/0x90 [ 430.146147][ T9329] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.147897][ T9329] kvm_dev_ioctl+0x210/0x1c20 [ 430.149670][ T9329] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.151599][ T9329] ? bit_wait_io_timeout+0x160/0x160 [ 430.153506][ T9329] ? __fget_files+0x272/0x410 [ 430.155211][ T9329] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.157169][ T9329] ? __fget_files+0x272/0x410 [ 430.158861][ T9329] ? bpf_lsm_file_ioctl+0x9/0x10 [ 430.160690][ T9329] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.162657][ T9329] __do_compat_sys_ioctl+0x2bf/0x330 [ 430.164562][ T9329] __do_fast_syscall_32+0x61/0xe0 [ 430.166382][ T9329] do_fast_syscall_32+0x33/0x70 [ 430.168141][ T9329] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 430.170397][ T9329] RIP: 0023:0xf7f82579 [ 430.171860][ T9329] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 430.178744][ T9329] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 430.181722][ T9329] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 430.184594][ T9329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 430.187408][ T9329] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 430.190243][ T9329] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 430.193148][ T9329] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.196277][ T9329] 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 5) 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x10, &(0x7f00000002c0)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x64}, @ldst={0x3, 0x3, 0x2, 0x5, 0x2, 0x20, 0xfffffffffffffff0}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x304, 0x0, 0x0, 0x0, 0x800}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x0, 0x5, 0x7, 0x1}, @ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, &(0x7f00000000c0), 0x41100, 0x20, '\x00', r2, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0x7, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000180)=[r0, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x5, 0x4, 0x4, 0x2}], 0x10, 0x10000}, 0x90) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r10, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x0) r11 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r11, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 430.216621][ T9343] FAULT_INJECTION: forcing a failure. [ 430.216621][ T9343] name fail_page_alloc, interval 1, probability 0, space 0, times 1 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r11, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 430.221791][ T9343] CPU: 1 PID: 9343 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x10, &(0x7f00000002c0)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x64}, @ldst={0x3, 0x3, 0x2, 0x5, 0x2, 0x20, 0xfffffffffffffff0}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x304, 0x0, 0x0, 0x0, 0x800}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x0, 0x5, 0x7, 0x1}, @ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, &(0x7f00000000c0), 0x41100, 0x20, '\x00', r2, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0x7, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000180)=[r0, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x5, 0x4, 0x4, 0x2}], 0x10, 0x10000}, 0x90) [ 430.226175][ T9343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 430.230723][ T9343] Call Trace: [ 430.232217][ T9343] [ 430.233527][ T9343] dump_stack_lvl+0x125/0x1b0 [ 430.235617][ T9343] should_fail_ex+0x496/0x5b0 [ 430.237719][ T9343] ? fs_reclaim_acquire+0xb0/0x150 [ 430.239978][ T9343] __should_fail_alloc_page+0xe7/0x130 [ 430.242419][ T9343] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 430.245358][ T9343] ? kasan_set_track+0x25/0x30 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x10, &(0x7f00000002c0)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x64}, @ldst={0x3, 0x3, 0x2, 0x5, 0x2, 0x20, 0xfffffffffffffff0}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x304, 0x0, 0x0, 0x0, 0x800}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ldst={0x2, 0x1, 0x0, 0x5, 0x7, 0x1}, @ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, &(0x7f00000000c0), 0x41100, 0x20, '\x00', r2, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x2, 0x7, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000180)=[r0, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x5, 0x4, 0x4, 0x2}], 0x10, 0x10000}, 0x90) [ 430.247482][ T9343] __alloc_pages+0x14e/0x4a0 [ 430.249466][ T9343] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 430.252533][ T9343] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 430.254837][ T9343] alloc_pages+0x1a9/0x270 [ 430.256500][ T9343] ? kasan_depopulate_vmalloc_pte+0x80/0x80 [ 430.258683][ T9343] __get_free_pages+0xc/0x40 [ 430.260403][ T9343] kasan_populate_vmalloc_pte+0x29/0x160 [ 430.262476][ T9343] ? kasan_depopulate_vmalloc_pte+0x80/0x80 [ 430.264677][ T9343] __apply_to_page_range+0x5ed/0xdb0 [ 430.266592][ T9343] ? kasan_depopulate_vmalloc_pte+0x80/0x80 [ 430.268742][ T9343] ? vm_insert_pages+0xcd0/0xcd0 [ 430.270546][ T9343] alloc_vmap_area+0x85f/0x2060 [ 430.272816][ T9343] ? free_vmap_area+0x1c40/0x1c40 [ 430.274744][ T9343] __get_vm_area_node+0x132/0x3d0 [ 430.276608][ T9343] __vmalloc_node_range+0x27a/0x1540 [ 430.278534][ T9343] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.280327][ T9343] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.282107][ T9343] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.284068][ T9343] ? delayed_vfree_work+0x70/0x70 [ 430.285912][ T9343] ? vsprintf+0x30/0x30 [ 430.287755][ T9343] ? _raw_spin_unlock+0x28/0x40 [ 430.289928][ T9343] ? alloc_fd+0x2da/0x6c0 [ 430.291846][ T9343] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.294010][ T9343] __vmalloc+0x6d/0x90 [ 430.295831][ T9343] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.297997][ T9343] kvm_dev_ioctl+0x210/0x1c20 [ 430.300094][ T9343] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.302528][ T9343] ? bit_wait_io_timeout+0x160/0x160 [ 430.304887][ T9343] ? __fget_files+0x272/0x410 [ 430.306977][ T9343] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.309387][ T9343] ? __fget_files+0x272/0x410 [ 430.311219][ T9343] ? bpf_lsm_file_ioctl+0x9/0x10 [ 430.313032][ T9343] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.314975][ T9343] __do_compat_sys_ioctl+0x2bf/0x330 [ 430.316923][ T9343] __do_fast_syscall_32+0x61/0xe0 [ 430.318756][ T9343] do_fast_syscall_32+0x33/0x70 [ 430.320548][ T9343] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 430.322851][ T9343] RIP: 0023:0xf7f82579 [ 430.324355][ T9343] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 430.331284][ T9343] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 430.334294][ T9343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 430.337200][ T9343] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 430.340047][ T9343] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 430.342889][ T9343] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 430.345751][ T9343] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.348617][ T9343] 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 6) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (fail_nth: 1) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0}, &(0x7f0000000d40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001280)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c0040000", @ANYRES16=r4, @ANYBLOB="000225bd7000ffdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="e40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004002204000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc00028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004007a00000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000008000100", @ANYRES32=r1, @ANYBLOB="44000280400001003f0001007072696f726974790000000000000000000000000000000000000000000000ef040003000e00000000000400ff03000008000600", @ANYRES32=r1, @ANYBLOB], 0x4c0}, 0x1, 0x0, 0x0, 0x20088044}, 0x4) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r11, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000ffdbdf252500000008002f0000415a58b8000200", @ANYRES32=r1, @ANYBLOB="05002a000400000008000200", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x8881}, 0x814) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 430.365546][ T9360] FAULT_INJECTION: forcing a failure. [ 430.365546][ T9360] name fail_usercopy, interval 1, probability 0, space 0, times 0 03:29:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000ffdbdf252500000008002f0000415a58b8000200", @ANYRES32=r1, @ANYBLOB="05002a000400000008000200", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x8881}, 0x814) (async) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 430.370182][ T9364] FAULT_INJECTION: forcing a failure. [ 430.370182][ T9364] name failslab, interval 1, probability 0, space 0, times 0 [ 430.370410][ T9360] CPU: 2 PID: 9360 Comm: syz-executor.3 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 430.378889][ T9360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 430.382752][ T9360] Call Trace: [ 430.384010][ T9360] [ 430.385106][ T9360] dump_stack_lvl+0x125/0x1b0 [ 430.386835][ T9360] should_fail_ex+0x496/0x5b0 [ 430.388577][ T9360] _copy_to_user+0x30/0xb0 [ 430.390245][ T9360] simple_read_from_buffer+0xd0/0x150 [ 430.392218][ T9360] proc_fail_nth_read+0x1b0/0x280 [ 430.394065][ T9360] ? proc_tid_comm_permission+0x1f0/0x1f0 [ 430.396171][ T9360] ? security_file_permission+0xdc/0x100 03:29:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000ffdbdf252500000008002f0000415a58b8000200", @ANYRES32=r1, @ANYBLOB="05002a000400000008000200", @ANYRES32=0x0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x8881}, 0x814) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 430.398224][ T9360] ? proc_tid_comm_permission+0x1f0/0x1f0 [ 430.400455][ T9360] vfs_read+0x1ce/0x930 [ 430.402018][ T9360] ? kernel_read+0x1b0/0x1b0 [ 430.403746][ T9360] ? __fget_files+0x272/0x410 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @local, @initdev}, &(0x7f0000000cc0)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 430.405619][ T9360] ksys_read+0x12f/0x250 [ 430.407238][ T9360] ? vfs_write+0xe40/0xe40 [ 430.408891][ T9360] __do_fast_syscall_32+0x61/0xe0 [ 430.410737][ T9360] do_fast_syscall_32+0x33/0x70 [ 430.412570][ T9360] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 430.414898][ T9360] RIP: 0023:0xf7fd3579 [ 430.416413][ T9360] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 430.423415][ T9360] RSP: 002b:00000000f7fce5e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 430.426436][ T9360] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000f7fce670 [ 430.429317][ T9360] RDX: 000000000000000f RSI: 00000000f7353ff4 RDI: 0000000000000000 [ 430.432194][ T9360] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 430.435068][ T9360] R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000000 [ 430.437952][ T9360] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.440835][ T9360] [ 430.441976][ T9364] CPU: 3 PID: 9364 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 430.445713][ T9364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 430.449332][ T9364] Call Trace: [ 430.450552][ T9364] [ 430.451631][ T9364] dump_stack_lvl+0x125/0x1b0 [ 430.453358][ T9364] should_fail_ex+0x496/0x5b0 [ 430.455075][ T9364] should_failslab+0x9/0x20 [ 430.456764][ T9364] kmem_cache_alloc_node+0x384/0x3f0 [ 430.458692][ T9364] ? alloc_vmap_area+0xd93/0x2060 [ 430.460573][ T9364] alloc_vmap_area+0xd93/0x2060 [ 430.462353][ T9364] ? free_vmap_area+0x1c40/0x1c40 [ 430.464197][ T9364] __get_vm_area_node+0x132/0x3d0 [ 430.466034][ T9364] __vmalloc_node_range+0x27a/0x1540 [ 430.467949][ T9364] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.469732][ T9364] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.471500][ T9364] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.473461][ T9364] ? delayed_vfree_work+0x70/0x70 [ 430.475291][ T9364] ? vsprintf+0x30/0x30 [ 430.476829][ T9364] ? _raw_spin_unlock+0x28/0x40 [ 430.478602][ T9364] ? alloc_fd+0x2da/0x6c0 [ 430.480228][ T9364] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.481998][ T9364] __vmalloc+0x6d/0x90 [ 430.483501][ T9364] ? kvm_dev_ioctl+0x210/0x1c20 [ 430.485285][ T9364] kvm_dev_ioctl+0x210/0x1c20 [ 430.486999][ T9364] ? reacquire_held_locks+0x4b0/0x4b0 [ 430.488963][ T9364] ? bit_wait_io_timeout+0x160/0x160 [ 430.490881][ T9364] ? __fget_files+0x272/0x410 [ 430.492600][ T9364] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.494547][ T9364] ? __fget_files+0x272/0x410 [ 430.496287][ T9364] ? bpf_lsm_file_ioctl+0x9/0x10 [ 430.498110][ T9364] ? kvm_vcpu_stats_release+0x80/0x80 [ 430.500093][ T9364] __do_compat_sys_ioctl+0x2bf/0x330 [ 430.502010][ T9364] __do_fast_syscall_32+0x61/0xe0 [ 430.503851][ T9364] do_fast_syscall_32+0x33/0x70 [ 430.505636][ T9364] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 430.507926][ T9364] RIP: 0023:0xf7f82579 [ 430.509425][ T9364] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 430.516397][ T9364] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 430.519424][ T9364] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 430.522286][ T9364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 430.525149][ T9364] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 430.528013][ T9364] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 430.530914][ T9364] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 430.533780][ T9364] 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 7) 03:29:57 executing program 0: socket$netlink(0x10, 0x3, 0xf) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:57 executing program 0: socket$netlink(0x10, 0x3, 0xf) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) (async) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x10) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000c00)={'gretap0\x00', &(0x7f0000000b80)={'ip_vti0\x00', r1, 0x80, 0x8000, 0x0, 0x8, {{0xe, 0x4, 0x3, 0xe, 0x38, 0x65, 0x0, 0x9, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x68, 0x1, 0x6, [{@remote, 0x7}, {@multicast1, 0x6}, {@remote, 0x200000}, {@private=0xa010100, 0x9}]}]}}}}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 0: socket$netlink(0x10, 0x3, 0xf) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 8) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x38) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x50}, 0x20000040) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @initdev}, &(0x7f0000000040)=0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x2f, 0x0, 0x2, 0x2, 0x4c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x100, 0x8}}) bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2000) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000ac0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x50}, 0x20000040) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @initdev}, &(0x7f0000000040)=0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x2f, 0x0, 0x2, 0x2, 0x4c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x100, 0x8}}) bpf$MAP_CREATE(0x2, 0x0, 0x10) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x50}, 0x20000040) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @initdev}, &(0x7f0000000040)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x2f, 0x0, 0x2, 0x2, 0x4c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x100, 0x8}}) (async) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 9) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x3800) 03:29:57 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x50}, 0x20000040) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @initdev}, &(0x7f0000000040)=0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x2f, 0x0, 0x2, 0x2, 0x4c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x100, 0x8}}) bpf$MAP_CREATE(0x2, 0x0, 0x10) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r1, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x50}, 0x20000040) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @initdev}, &(0x7f0000000040)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', r2, 0x2f, 0x0, 0x2, 0x2, 0x4c, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x100, 0x8}}) (async) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) openat$btrfs_control(0xffffff9c, &(0x7f0000000a40), 0x400, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 10) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff9f) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x4, 0xfff, 0x6, 0x8, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5, 0x4}, 0x48) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0x5, 0x8, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x3, 0x3, 0x6, 0x5, 0x9}, @ldst={0x3, 0x1, 0x2, 0x7, 0xa, 0x10}, @jmp={0x5, 0x0, 0x6, 0x8, 0xb, 0xffffffffffffffc0, 0xfffffffffffffffc}, @ldst={0x3, 0x3, 0x2, 0x9, 0x0, 0x4, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x921, 0xca, &(0x7f00000000c0)=""/202, 0x40f00, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x5, 0x1}, 0x10, 0x0, r1, 0x4, &(0x7f00000002c0)=[r0, r2, r3], &(0x7f0000000300)=[{0x5, 0x5, 0x2}, {0x2, 0x2, 0xd}, {0x0, 0x1, 0x3, 0x5}, {0x4, 0x4, 0x2, 0x9}], 0x10, 0xfa}, 0x90) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c010000", @ANYRES16=r0, @ANYBLOB="040029bd7000fbd9df250000000008004600", @ANYRES32=r1, @ANYBLOB="bc00028038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004002f00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400f1fc000008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="bc0002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=r2, @ANYBLOB="3c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000500030005000000090004006861736800000000"], 0x19c}, 0x1, 0x0, 0x0, 0x4000888}, 0x8000080) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r1}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 11) 03:29:57 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff9f) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x4, 0xfff, 0x6, 0x8, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5, 0x4}, 0x48) (async) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r3, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0x5, 0x8, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x3, 0x3, 0x6, 0x5, 0x9}, @ldst={0x3, 0x1, 0x2, 0x7, 0xa, 0x10}, @jmp={0x5, 0x0, 0x6, 0x8, 0xb, 0xffffffffffffffc0, 0xfffffffffffffffc}, @ldst={0x3, 0x3, 0x2, 0x9, 0x0, 0x4, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x921, 0xca, &(0x7f00000000c0)=""/202, 0x40f00, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x5, 0x1}, 0x10, 0x0, r1, 0x4, &(0x7f00000002c0)=[r0, r2, r3], &(0x7f0000000300)=[{0x5, 0x5, 0x2}, {0x2, 0x2, 0xd}, {0x0, 0x1, 0x3, 0x5}, {0x4, 0x4, 0x2, 0x9}], 0x10, 0xfa}, 0x90) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 12) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r0}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 13) 03:29:57 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff9f) (async) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x4, 0xfff, 0x6, 0x8, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5, 0x4}, 0x48) (async) r3 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0x5, 0x8, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x3, 0x3, 0x6, 0x5, 0x9}, @ldst={0x3, 0x1, 0x2, 0x7, 0xa, 0x10}, @jmp={0x5, 0x0, 0x6, 0x8, 0xb, 0xffffffffffffffc0, 0xfffffffffffffffc}, @ldst={0x3, 0x3, 0x2, 0x9, 0x0, 0x4, 0xfffffffffffffffc}]}, &(0x7f0000000080)='GPL\x00', 0x921, 0xca, &(0x7f00000000c0)=""/202, 0x40f00, 0x4, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0x5, 0x1}, 0x10, 0x0, r1, 0x4, &(0x7f00000002c0)=[r0, r2, r3], &(0x7f0000000300)=[{0x5, 0x5, 0x2}, {0x2, 0x2, 0xd}, {0x0, 0x1, 0x3, 0x5}, {0x4, 0x4, 0x2, 0x9}], 0x10, 0xfa}, 0x90) 03:29:57 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r2, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r0}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:57 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0xffffff67) 03:29:58 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 14) 03:29:58 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:58 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0xffffff67) 03:29:58 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) 03:29:58 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0xffffff67) 03:29:58 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 15) 03:29:58 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:58 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="94becc51281f860b7f1c59a3b0b44aa97d01cbb6eabd663c77c5af3f57401123a48be437103e23a70e12af33d3f9ebd09dd6f791a9437eaf16cb0b1f2d151e18a51af1c468cdf943eb5fee29a7bde13518befe7ce98f703c07e220d460bbfc8fad011d1858f79aa2db579cd1f33ea0b411a7b981c1cba841918e4094672ffb75eba7cbe80612e09cb20f8219d08dd5f9016322ae4c9b88c061e4f7b0605f13ea059b8933309d8664f653ced72fff740148ad51c0ea5de7d322cce39dad880160c9fca40af861e394816420aaa065b1ce9ea523c544476028b3d62a3f970eb30fc7482da984f86c840cf26d1bfb6224507ea74d893e97ad0ced8d9256c5125c5361ff3e56ae394fdf3e78e66cfa77b057fa5ae64a9f8cc90908b8133395c6f72cfb17ed974fd5cc4160ad1eb385388b1da2816ac616e5fd04fa41829413a95403719b66c7773e65bd7ed7d2a3b0bda6549966934da71e7b97f2f67c75dbeef7eebe400c4cee559e6cf1ee21acde551b1acb352252f31bd77bd3cbbc8cde165dda8113f6423912dda3a9e223f14cb0d7217c7dfaca319bc42b7eb990fd8e50d8070a9d7b6cba0a566be09a577c03fc3db32eb9d5c40676e5233dece2fe4acb6e97944d2dfa9e3b404890d14143d83ab87db501f5ea5d2a154cc672d0eda19d8c18abe72288a197448bde7956cae357f5e7ee470a8c8062194d68af82289c22ad245a3bce64fb0c4aac010a0592ba3d3cc0c3fdfbbe3ffd7288f9ec9e1693a171cb62aa74226fb734fa6ce8d59dd26fe169bc1b5e0905f73ccbd998bd9defbcafdb644103a98eb2712f12191114ef753a14231ca35dcf85ce9023c0bf5cd1a5e03a1266b7bc6c2d29fab44c9a2c2a259874ef89f6f70954921531a12e79ecef78bfa5af6d339117c2e68d82ff8f86cae7fab178a49f86b8c1f36fb40251066bc97c3b6e4163972adfaf8a6de337ba7086f0c6081a65fc2a465e4e016fb837008cebb54cd12dbca019c07ad9bed53ceb7f7f3f4eceeec6477cd1d6d065a973d3b0a42580eafbfc3dc7c85c498ca17b76968d7bcd956f232a57a66fd52ab72af641fa82777b3a2906c60fa03787b1271024f5d1acfbb9c2e3e06d78e4a8b31abc9e06bd6807f3202291f3ec19963e7b457010708570b869cfdfe8d097286dab857fa9b1eac4e302717c48bd46b3b800140d2d83b1ca41413bbe5ebca56fd6274cc89b13617351971e640c080a2dbad381fddb94f8b05749363632b2c77f2ff22151938bdd2146ccd595f2c24f54b3b2780d1b41107684188f1bbc2710171339dacd599617401cddec753fca4258b20eadbf63e3cfbbe98112c1d1a606e3be26b15f4531d35408bb9a96374d6fae4e0d531a5821d79fc548941cec8c36659dec9ac6009335910701a3eb25b3f9c1b25a4af52c22204b1b97c1694581ed461af1537da12bf73a4f797a953841c7522eb367aa70b4573c81b10f2903fb8236d17c96a8b942fea69af4022b703fba2880eed33a5407b252651e356f5866bd0738dc075d1bf7930d124fae5bbe6226620bc4a16d6df0bb7745451bbee5f8406e50dbad3867685216c64e8ce8bf69c2372a14630d8c990f20b24f09a65df9a720c15b454d5f85081a200e7d30a31b8865529ed48a0eafeae7273d08a16e8a80ed44706154715c44b904368abe2ed63824068874eef07539740fa1ac7c99008a9e2a57eee7d1c99b8c2816ab0d761d40330de4bf264fce27ca5e5c4dafc8d87be99b3e8612bf078e0a30dc0b7aa96e8cc6eb67d494777938d517bfc3975adab64bc81d23c7309a6383e3457770f3b26425018a784444aa455c367ac0d8e33ab07f8a2e40535fbc8684f822cad0a3ddba5872bdfb15e70711ed6de171d40140a5649b549e785fd5f1ae4fa2e5fecba1f35e82ae7295d8e88d03303ca754cb948cde8c02059cefe56bf6a14c0c2a5f1d7ff19660ffa30914640bd8a92efa61a4117552e6b269caf5a10240d4e1fd937790e69c06cb56bee4f6c183efed66013a43f511d81e7e3cf974cde998ba515fb53e38ed587d8fd7232786fb3ff4e97ad3460f4b5351100252e88b0b2d05b985a32e4572ac54ca7cc979f2d55f4ddec03e9d6f262f3553b12cf06e9634f24072172d2f9b134ba153d07e1223bff7c8a1ba869fffc6352d2b8eb954b3033503629d33685a75dd87ab00564c05f6074816fa95224cb3eabe7517ff4d17d011f82553e8fe8ddd499874365c4bcd8d3eb65dda4357440c83fca81d9918ee10cd9787fb0257bfe649cb9a7f200d46100c2a7fb9e80e50d52c14c0cf22dd7daad2e09692e6ba91f4ac75504722eda8b0761026e253516e2c09b9e608bbfeffdad49f391ccd9263252007717d48062076433a63507fc8c2a463e74d52f20810314bacc8289c4fbab2458c6ef770b91305579f499f248e149b90e5f72939edd58827b4523c0a7023af60dea911729adb14d363b22dc3efa1b7f9b45085e49900538ff1fa49a3f00efbb944029c1417ab9fd561cbf204719ffd68bdfe988a8248ad7d259edade8d2874b426a36402c8f55f80ce03ed3b5dc0485dae50468c7f63b1037d66572ea3070bd9398c9de15daa657fdad1a13c833c13ef09a002418c27d807e825e9a02fbe19a1fb75e1f2b0d8b2a828723d46cb75e3ae7a65fd020352bd81ffdde3deea99c91a71be062c59583d83b51a471270e9d1470b32d7cb1b1072801aede03ac50e6a42f1c0f7f528e071aed6e0de8068e6019e7fdc632b97a906740fdc57af0177353a3cd0db552345b886164054062951bf4e3571daee11061f30b6bcc991bbee143e9af95c3511960482895964b15c56d6192ad34a14b36fbc1166db421360f66d0db79846466789eeb9912c3e3fb4c92c79f53d766afdb065f13416092bf2c91c8c40e0251e85c23d96f8f8e4e92ae07a84b6788bef0ef5fb1805723233ad091413d978c93861deb18fc3bc04c654d23d5e8b667d0b78919ca5f1f1fed0d89788b543d91e15644c1fa0a8a2ab89a0f5f447cc892e35a6b40eb50bc5a5a6a040526a597abc4a07fa590698fa73062a9d83878f88bd5344296a36a80903459f4d336abc428f2298a84f29def431377fd29266eb0f5a10e439ad0836d1e2363f4f2fcc38fefd7172a8b530f4c9c46500d7a349fa0cf3b9d2ce17981ca9270f981dfd359f7c94c896c17c2f57980f1a00e7f8cd25a2b45a34ec6aa3bba526f6158276dd8ba71b50342ab3f675b75a0bd60459545b098b4f5799d49a82b9c98df9660eb9e7edae307e0307053ad43b973f8d5a01846a1a12f30deaf1e93503540cda40582dc8eb25cb22c85ecb333522d56502c9635e5c6238b56ea28a0c5ff5d5508c8161287a94b61866fd71e4f67070d50045b3db63a15d12ca443f828139b115aa1aea308cf62b0535dcb8f9000366e99e01ba9f063caeb8fdd76def28170d3677bc142c691afeaaa944084a468782b33d3c0abf831b4a70af374fc79560f698748ddccc020ae996e2d67a7418aeab22fdaa32360000c3302ab40ed7a8affec9f1140701384c111051cdb363bb98f86a6509687648afd80942971d37d3d5296a2aea8e1c98dd3ba69b40839a258fdc1620f5baefd3b3f93a9fc2d2cc665b820b3e9525375eae940f20ebdbd6c0f2dfb8b5442bc2dcbf369d33bec10466f68654ccf5fbe09f2ba9f890734a4de760abe3f46b2c78dc9f9487342f390d4696184273ba62a9a4c4ec266fffcec84b14be02c981bfd89278441c099b147a0fe93a8c624026d9fae9639aa9c23d236cac192b99619375209aec261e3b4eeb2cae0c7bfc777983d7681a5f48c19372b67de94a9402229137e2ab9a509b35071a1f1f0b68811629d4e7686a1158dafb503656eae040170a01a8bff74bed9b201ab9effe8c5624ef8108fb1d36c2af82ded24c8150809dc5557d757b47fad6b6a95ae62cd4214bf799e0582733218c4e6f52a8bcd115f9e82c7c16e9aed11266d065de0ce359f3b760465cae6b938c97326733265539a218f0317caca83d9403e65810dcee54c0bf8a7381b3cd8a56d11e66de7f21f197af3bd418139b4b187143fce321c17f1348c811ca477eaae694191d9a7297cfc3edf9fc5ec0c0f1b99756457bcdbbb16f6d08107b4c2144704f114e76948ee6ab40eceef74d8c92f8407878865984c7297e9becbdb585e96e840d01130f4460d6d6e6101e8901d3cef3678bcd75ccf62a9c26eefa1298c17f2c778af41f501c5c79ca32fa32af50db5c34024b0005ca71a3012daef4d404e69c2381a38dff47f62a2b2fc1f8f5a4b1d899ec09c43d65ad07df53271fbf4f441d3d2c0d2468dee1ce13e451085f82e821af66eb1c49ade1fbf31513f8bf29462b157c88dcb6168ff4b8237686637a6b34463030243b5d3ada640141cd795ba14f9bdfc275e557cb086f627cc44aebc22aa748d10869b00d308c767ab3541fe63e00201304177b6ee7fbc24c690a51774def9b29d908bc06229b8e0b7eac9cc87a8935fe3011e6734b2c3faeaf0ae348d64698a3428a89c74a6c95e687c0d7e0dfa1235c7ac5b03f061e3073f1e4bff7b51b264487caa6097b9ad3368d88d09c1a07258d97f78ccebd146b0a03adad3b8e15b117576077f657632dcda3f5ec7447094d2ee5619840923ded53cc2f23f0134a30fca00579cbce93458e09ba8916685583379ec660f7e4e98bee77baf5565e3c5c3776a57e08b5b67b4e63603a7d39580651cb5d60b8e3a4b20d5fe65b4961e4047a1533db0510fcb341ad4813fd4a0793b181a5d8229058da7d88c750124baa810b9797314f65e9c78aafe5d63a327c5004a21d63983aaca36029856786b6a4de2df75d0a33ce2d5771b7fd97e9a9b523c17e12aad4f753183ab4bc409fafd29a12ec85d2a5febfaef37c3961b4663c2417c4342239021e84a981d3d94823dc84451dfad8f80817e878f29ccb5310d2b698dc568d930377f894f77f4267f25f82f3484866f9d6ce90b82c471dfc4ddd8c46a53d0bb7e2455a7b5935ed2dedc090a7b2ac8b17db7efaa2d9b69da8fe155e404000db4fb2deb1ce90dd887c7df323f80494f1fc1dd3e49e87383a21cde9317c889302f8d2e7b0aefeb33c97b23ba4065695ce03b91152a7e164cdf76de28891795d29063140beac3652faeb96361058efe752df02e37ff93cd80c6d5077b7a6747678ff62493bcfea32cdf8e998676c4d50ff5f8b50c09b1f52cc929b332cbbe40decffebf2a4ded53268cb30d9e548fcdb4d8539f995e5b3105d8f3a8e950ff84451db14613b723d67fc8b5caf0d2c80744152c6799938fea1b9174844ef885c9868bff4cb63528244131943abfb8fa1985db02f918377409348bdf1285db3042ebcb226167d3fc20f90f442e680cfd02f045524782ce13c3015cdce111c0b6c62ec91350bf2ec8798ad53c32459e60ae60a56e985143f576079a284a380baf09062af1189dde84c3474c9377f0188dcff89595c00b554a3eb2883a0ff698a68eed56041a7641fd70454e0429dde2896f228f79977cfc866bf686241196eae1e50de37c98ed2f7b4312e6ba9adaf2e4bf37e2eb6de989e3025b00651f0ea33c9ae08e3033e5d1f827a9c2d779fad42eebf13fdfc9f335127e82fb3d2c48b67edd4fedddd13761ead0323a839bc992ca72993b6c5dcebeb5714a22e08acb3b04ae40d7cff69d9c2bd652870bb2771e7e567cb37ed4c3d1b501a2dbdce666d7aa24b6d540447cb38338033f78f8b3a4a39d7d4ba72d409f97923c3f73067fd4503f2690774", 0x1000, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0xf0a, 0xfff, r0) 03:29:58 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 16) 03:29:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:59 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) r0 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0xf0a, 0xfff, r0) 03:29:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 17) 03:29:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:59 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$cuse(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x8}}, 0x18) geteuid() r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 18) 03:29:59 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="94becc51281f860b7f1c59a3b0b44aa97d01cbb6eabd663c77c5af3f57401123a48be437103e23a70e12af33d3f9ebd09dd6f791a9437eaf16cb0b1f2d151e18a51af1c468cdf943eb5fee29a7bde13518befe7ce98f703c07e220d460bbfc8fad011d1858f79aa2db579cd1f33ea0b411a7b981c1cba841918e4094672ffb75eba7cbe80612e09cb20f8219d08dd5f9016322ae4c9b88c061e4f7b0605f13ea059b8933309d8664f653ced72fff740148ad51c0ea5de7d322cce39dad880160c9fca40af861e394816420aaa065b1ce9ea523c544476028b3d62a3f970eb30fc7482da984f86c840cf26d1bfb6224507ea74d893e97ad0ced8d9256c5125c5361ff3e56ae394fdf3e78e66cfa77b057fa5ae64a9f8cc90908b8133395c6f72cfb17ed974fd5cc4160ad1eb385388b1da2816ac616e5fd04fa41829413a95403719b66c7773e65bd7ed7d2a3b0bda6549966934da71e7b97f2f67c75dbeef7eebe400c4cee559e6cf1ee21acde551b1acb352252f31bd77bd3cbbc8cde165dda8113f6423912dda3a9e223f14cb0d7217c7dfaca319bc42b7eb990fd8e50d8070a9d7b6cba0a566be09a577c03fc3db32eb9d5c40676e5233dece2fe4acb6e97944d2dfa9e3b404890d14143d83ab87db501f5ea5d2a154cc672d0eda19d8c18abe72288a197448bde7956cae357f5e7ee470a8c8062194d68af82289c22ad245a3bce64fb0c4aac010a0592ba3d3cc0c3fdfbbe3ffd7288f9ec9e1693a171cb62aa74226fb734fa6ce8d59dd26fe169bc1b5e0905f73ccbd998bd9defbcafdb644103a98eb2712f12191114ef753a14231ca35dcf85ce9023c0bf5cd1a5e03a1266b7bc6c2d29fab44c9a2c2a259874ef89f6f70954921531a12e79ecef78bfa5af6d339117c2e68d82ff8f86cae7fab178a49f86b8c1f36fb40251066bc97c3b6e4163972adfaf8a6de337ba7086f0c6081a65fc2a465e4e016fb837008cebb54cd12dbca019c07ad9bed53ceb7f7f3f4eceeec6477cd1d6d065a973d3b0a42580eafbfc3dc7c85c498ca17b76968d7bcd956f232a57a66fd52ab72af641fa82777b3a2906c60fa03787b1271024f5d1acfbb9c2e3e06d78e4a8b31abc9e06bd6807f3202291f3ec19963e7b457010708570b869cfdfe8d097286dab857fa9b1eac4e302717c48bd46b3b800140d2d83b1ca41413bbe5ebca56fd6274cc89b13617351971e640c080a2dbad381fddb94f8b05749363632b2c77f2ff22151938bdd2146ccd595f2c24f54b3b2780d1b41107684188f1bbc2710171339dacd599617401cddec753fca4258b20eadbf63e3cfbbe98112c1d1a606e3be26b15f4531d35408bb9a96374d6fae4e0d531a5821d79fc548941cec8c36659dec9ac6009335910701a3eb25b3f9c1b25a4af52c22204b1b97c1694581ed461af1537da12bf73a4f797a953841c7522eb367aa70b4573c81b10f2903fb8236d17c96a8b942fea69af4022b703fba2880eed33a5407b252651e356f5866bd0738dc075d1bf7930d124fae5bbe6226620bc4a16d6df0bb7745451bbee5f8406e50dbad3867685216c64e8ce8bf69c2372a14630d8c990f20b24f09a65df9a720c15b454d5f85081a200e7d30a31b8865529ed48a0eafeae7273d08a16e8a80ed44706154715c44b904368abe2ed63824068874eef07539740fa1ac7c99008a9e2a57eee7d1c99b8c2816ab0d761d40330de4bf264fce27ca5e5c4dafc8d87be99b3e8612bf078e0a30dc0b7aa96e8cc6eb67d494777938d517bfc3975adab64bc81d23c7309a6383e3457770f3b26425018a784444aa455c367ac0d8e33ab07f8a2e40535fbc8684f822cad0a3ddba5872bdfb15e70711ed6de171d40140a5649b549e785fd5f1ae4fa2e5fecba1f35e82ae7295d8e88d03303ca754cb948cde8c02059cefe56bf6a14c0c2a5f1d7ff19660ffa30914640bd8a92efa61a4117552e6b269caf5a10240d4e1fd937790e69c06cb56bee4f6c183efed66013a43f511d81e7e3cf974cde998ba515fb53e38ed587d8fd7232786fb3ff4e97ad3460f4b5351100252e88b0b2d05b985a32e4572ac54ca7cc979f2d55f4ddec03e9d6f262f3553b12cf06e9634f24072172d2f9b134ba153d07e1223bff7c8a1ba869fffc6352d2b8eb954b3033503629d33685a75dd87ab00564c05f6074816fa95224cb3eabe7517ff4d17d011f82553e8fe8ddd499874365c4bcd8d3eb65dda4357440c83fca81d9918ee10cd9787fb0257bfe649cb9a7f200d46100c2a7fb9e80e50d52c14c0cf22dd7daad2e09692e6ba91f4ac75504722eda8b0761026e253516e2c09b9e608bbfeffdad49f391ccd9263252007717d48062076433a63507fc8c2a463e74d52f20810314bacc8289c4fbab2458c6ef770b91305579f499f248e149b90e5f72939edd58827b4523c0a7023af60dea911729adb14d363b22dc3efa1b7f9b45085e49900538ff1fa49a3f00efbb944029c1417ab9fd561cbf204719ffd68bdfe988a8248ad7d259edade8d2874b426a36402c8f55f80ce03ed3b5dc0485dae50468c7f63b1037d66572ea3070bd9398c9de15daa657fdad1a13c833c13ef09a002418c27d807e825e9a02fbe19a1fb75e1f2b0d8b2a828723d46cb75e3ae7a65fd020352bd81ffdde3deea99c91a71be062c59583d83b51a471270e9d1470b32d7cb1b1072801aede03ac50e6a42f1c0f7f528e071aed6e0de8068e6019e7fdc632b97a906740fdc57af0177353a3cd0db552345b886164054062951bf4e3571daee11061f30b6bcc991bbee143e9af95c3511960482895964b15c56d6192ad34a14b36fbc1166db421360f66d0db79846466789eeb9912c3e3fb4c92c79f53d766afdb065f13416092bf2c91c8c40e0251e85c23d96f8f8e4e92ae07a84b6788bef0ef5fb1805723233ad091413d978c93861deb18fc3bc04c654d23d5e8b667d0b78919ca5f1f1fed0d89788b543d91e15644c1fa0a8a2ab89a0f5f447cc892e35a6b40eb50bc5a5a6a040526a597abc4a07fa590698fa73062a9d83878f88bd5344296a36a80903459f4d336abc428f2298a84f29def431377fd29266eb0f5a10e439ad0836d1e2363f4f2fcc38fefd7172a8b530f4c9c46500d7a349fa0cf3b9d2ce17981ca9270f981dfd359f7c94c896c17c2f57980f1a00e7f8cd25a2b45a34ec6aa3bba526f6158276dd8ba71b50342ab3f675b75a0bd60459545b098b4f5799d49a82b9c98df9660eb9e7edae307e0307053ad43b973f8d5a01846a1a12f30deaf1e93503540cda40582dc8eb25cb22c85ecb333522d56502c9635e5c6238b56ea28a0c5ff5d5508c8161287a94b61866fd71e4f67070d50045b3db63a15d12ca443f828139b115aa1aea308cf62b0535dcb8f9000366e99e01ba9f063caeb8fdd76def28170d3677bc142c691afeaaa944084a468782b33d3c0abf831b4a70af374fc79560f698748ddccc020ae996e2d67a7418aeab22fdaa32360000c3302ab40ed7a8affec9f1140701384c111051cdb363bb98f86a6509687648afd80942971d37d3d5296a2aea8e1c98dd3ba69b40839a258fdc1620f5baefd3b3f93a9fc2d2cc665b820b3e9525375eae940f20ebdbd6c0f2dfb8b5442bc2dcbf369d33bec10466f68654ccf5fbe09f2ba9f890734a4de760abe3f46b2c78dc9f9487342f390d4696184273ba62a9a4c4ec266fffcec84b14be02c981bfd89278441c099b147a0fe93a8c624026d9fae9639aa9c23d236cac192b99619375209aec261e3b4eeb2cae0c7bfc777983d7681a5f48c19372b67de94a9402229137e2ab9a509b35071a1f1f0b68811629d4e7686a1158dafb503656eae040170a01a8bff74bed9b201ab9effe8c5624ef8108fb1d36c2af82ded24c8150809dc5557d757b47fad6b6a95ae62cd4214bf799e0582733218c4e6f52a8bcd115f9e82c7c16e9aed11266d065de0ce359f3b760465cae6b938c97326733265539a218f0317caca83d9403e65810dcee54c0bf8a7381b3cd8a56d11e66de7f21f197af3bd418139b4b187143fce321c17f1348c811ca477eaae694191d9a7297cfc3edf9fc5ec0c0f1b99756457bcdbbb16f6d08107b4c2144704f114e76948ee6ab40eceef74d8c92f8407878865984c7297e9becbdb585e96e840d01130f4460d6d6e6101e8901d3cef3678bcd75ccf62a9c26eefa1298c17f2c778af41f501c5c79ca32fa32af50db5c34024b0005ca71a3012daef4d404e69c2381a38dff47f62a2b2fc1f8f5a4b1d899ec09c43d65ad07df53271fbf4f441d3d2c0d2468dee1ce13e451085f82e821af66eb1c49ade1fbf31513f8bf29462b157c88dcb6168ff4b8237686637a6b34463030243b5d3ada640141cd795ba14f9bdfc275e557cb086f627cc44aebc22aa748d10869b00d308c767ab3541fe63e00201304177b6ee7fbc24c690a51774def9b29d908bc06229b8e0b7eac9cc87a8935fe3011e6734b2c3faeaf0ae348d64698a3428a89c74a6c95e687c0d7e0dfa1235c7ac5b03f061e3073f1e4bff7b51b264487caa6097b9ad3368d88d09c1a07258d97f78ccebd146b0a03adad3b8e15b117576077f657632dcda3f5ec7447094d2ee5619840923ded53cc2f23f0134a30fca00579cbce93458e09ba8916685583379ec660f7e4e98bee77baf5565e3c5c3776a57e08b5b67b4e63603a7d39580651cb5d60b8e3a4b20d5fe65b4961e4047a1533db0510fcb341ad4813fd4a0793b181a5d8229058da7d88c750124baa810b9797314f65e9c78aafe5d63a327c5004a21d63983aaca36029856786b6a4de2df75d0a33ce2d5771b7fd97e9a9b523c17e12aad4f753183ab4bc409fafd29a12ec85d2a5febfaef37c3961b4663c2417c4342239021e84a981d3d94823dc84451dfad8f80817e878f29ccb5310d2b698dc568d930377f894f77f4267f25f82f3484866f9d6ce90b82c471dfc4ddd8c46a53d0bb7e2455a7b5935ed2dedc090a7b2ac8b17db7efaa2d9b69da8fe155e404000db4fb2deb1ce90dd887c7df323f80494f1fc1dd3e49e87383a21cde9317c889302f8d2e7b0aefeb33c97b23ba4065695ce03b91152a7e164cdf76de28891795d29063140beac3652faeb96361058efe752df02e37ff93cd80c6d5077b7a6747678ff62493bcfea32cdf8e998676c4d50ff5f8b50c09b1f52cc929b332cbbe40decffebf2a4ded53268cb30d9e548fcdb4d8539f995e5b3105d8f3a8e950ff84451db14613b723d67fc8b5caf0d2c80744152c6799938fea1b9174844ef885c9868bff4cb63528244131943abfb8fa1985db02f918377409348bdf1285db3042ebcb226167d3fc20f90f442e680cfd02f045524782ce13c3015cdce111c0b6c62ec91350bf2ec8798ad53c32459e60ae60a56e985143f576079a284a380baf09062af1189dde84c3474c9377f0188dcff89595c00b554a3eb2883a0ff698a68eed56041a7641fd70454e0429dde2896f228f79977cfc866bf686241196eae1e50de37c98ed2f7b4312e6ba9adaf2e4bf37e2eb6de989e3025b00651f0ea33c9ae08e3033e5d1f827a9c2d779fad42eebf13fdfc9f335127e82fb3d2c48b67edd4fedddd13761ead0323a839bc992ca72993b6c5dcebeb5714a22e08acb3b04ae40d7cff69d9c2bd652870bb2771e7e567cb37ed4c3d1b501a2dbdce666d7aa24b6d540447cb38338033f78f8b3a4a39d7d4ba72d409f97923c3f73067fd4503f2690774", 0x1000, 0xfffffffffffffff9) keyctl$reject(0x13, 0x0, 0xf0a, 0xfff, r0) 03:29:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:59 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$cuse(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x8}}, 0x18) (async) geteuid() (async) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 19) 03:29:59 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$full(0xffffff9c, &(0x7f0000000140), 0x100400, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x20, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x1}, [@generic={0x1, 0xe, 0x3, 0x6, 0xfa2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x7e, &(0x7f00000002c0)=""/126, 0x41100, 0x8, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000003c0)=[r0, r0, r0, 0x1], &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x2, 0x4}, {0x2, 0x2, 0xc}, {0x1, 0x3, 0x7, 0xa}, {0x3, 0x2, 0x7}], 0x10, 0xda96}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x0, 0x1, 0x6, 0x6, 0x30, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x65d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x4b, &(0x7f00000000c0)=""/75, 0x41100, 0x10, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xe, 0x745b, 0x2}, 0x10, r3, r4, 0x1, 0x0, &(0x7f0000000540)=[{0x2, 0x3, 0x7, 0x9}], 0x10, 0x1000}, 0x90) 03:29:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:29:59 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$cuse(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x8}}, 0x18) geteuid() (async) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) 03:29:59 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) r2 = openat$full(0xffffff9c, &(0x7f0000000140), 0x100400, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x20, 0x0}, 0x8) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x1}, [@generic={0x1, 0xe, 0x3, 0x6, 0xfa2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x7e, &(0x7f00000002c0)=""/126, 0x41100, 0x8, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000003c0)=[r0, r0, r0, 0x1], &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x2, 0x4}, {0x2, 0x2, 0xc}, {0x1, 0x3, 0x7, 0xa}, {0x3, 0x2, 0x7}], 0x10, 0xda96}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x0, 0x1, 0x6, 0x6, 0x30, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x65d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x4b, &(0x7f00000000c0)=""/75, 0x41100, 0x10, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xe, 0x745b, 0x2}, 0x10, r3, r4, 0x1, 0x0, &(0x7f0000000540)=[{0x2, 0x3, 0x7, 0x9}], 0x10, 0x1000}, 0x90) [ 432.580336][ T9490] FAULT_INJECTION: forcing a failure. [ 432.580336][ T9490] name failslab, interval 1, probability 0, space 0, times 0 [ 432.586416][ T9490] CPU: 0 PID: 9490 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 432.590296][ T9490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 432.594733][ T9490] Call Trace: [ 432.596276][ T9490] [ 432.597574][ T9490] dump_stack_lvl+0x125/0x1b0 [ 432.599640][ T9490] should_fail_ex+0x496/0x5b0 [ 432.601686][ T9490] should_failslab+0x9/0x20 [ 432.603331][ T9490] __kmem_cache_alloc_node+0x2f7/0x340 [ 432.605302][ T9490] ? init_srcu_struct_fields+0x8da/0xdc0 [ 432.607719][ T9490] kmalloc_trace+0x25/0xe0 [ 432.609817][ T9490] init_srcu_struct_fields+0x8da/0xdc0 [ 432.612059][ T9490] kvm_dev_ioctl+0x75e/0x1c20 [ 432.613760][ T9490] ? reacquire_held_locks+0x4b0/0x4b0 [ 432.615686][ T9490] ? bit_wait_io_timeout+0x160/0x160 [ 432.617608][ T9490] ? __fget_files+0x272/0x410 [ 432.619303][ T9490] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.621447][ T9490] ? __fget_files+0x272/0x410 [ 432.623660][ T9490] ? bpf_lsm_file_ioctl+0x9/0x10 [ 432.626002][ T9490] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.628501][ T9490] __do_compat_sys_ioctl+0x2bf/0x330 [ 432.630395][ T9490] __do_fast_syscall_32+0x61/0xe0 [ 432.632232][ T9490] do_fast_syscall_32+0x33/0x70 [ 432.633976][ T9490] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 432.636261][ T9490] RIP: 0023:0xf7f82579 [ 432.637726][ T9490] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 432.644862][ T9490] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 432.647821][ T9490] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 432.650674][ T9490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 432.653667][ T9490] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 432.656520][ T9490] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 432.659326][ T9490] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 432.662251][ T9490] 03:29:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 20) 03:29:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 432.690318][ T9501] FAULT_INJECTION: forcing a failure. [ 432.690318][ T9501] name failslab, interval 1, probability 0, space 0, times 0 [ 432.695079][ T9501] CPU: 2 PID: 9501 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:29:59 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$full(0xffffff9c, &(0x7f0000000140), 0x100400, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x20, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x1}, [@generic={0x1, 0xe, 0x3, 0x6, 0xfa2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x7e, &(0x7f00000002c0)=""/126, 0x41100, 0x8, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000003c0)=[r0, r0, r0, 0x1], &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x2, 0x4}, {0x2, 0x2, 0xc}, {0x1, 0x3, 0x7, 0xa}, {0x3, 0x2, 0x7}], 0x10, 0xda96}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x0, 0x1, 0x6, 0x6, 0x30, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x65d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x4b, &(0x7f00000000c0)=""/75, 0x41100, 0x10, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xe, 0x745b, 0x2}, 0x10, r3, r4, 0x1, 0x0, &(0x7f0000000540)=[{0x2, 0x3, 0x7, 0x9}], 0x10, 0x1000}, 0x90) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) openat$full(0xffffff9c, &(0x7f0000000140), 0x100400, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x20}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x1}, [@generic={0x1, 0xe, 0x3, 0x6, 0xfa2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x7e, &(0x7f00000002c0)=""/126, 0x41100, 0x8, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x9, 0x6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000003c0)=[r0, r0, r0, 0x1], &(0x7f0000000400)=[{0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0x2, 0x4}, {0x2, 0x2, 0xc}, {0x1, 0x3, 0x7, 0xa}, {0x3, 0x2, 0x7}], 0x10, 0xda96}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x0, 0x1, 0x6, 0x6, 0x30, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x65d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x4b, &(0x7f00000000c0)=""/75, 0x41100, 0x10, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xe, 0x745b, 0x2}, 0x10, r3, r4, 0x1, 0x0, &(0x7f0000000540)=[{0x2, 0x3, 0x7, 0x9}], 0x10, 0x1000}, 0x90) (async) [ 432.698942][ T9501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 432.702843][ T9501] Call Trace: [ 432.704346][ T9501] [ 432.705660][ T9501] dump_stack_lvl+0x125/0x1b0 [ 432.707762][ T9501] should_fail_ex+0x496/0x5b0 [ 432.709882][ T9501] should_failslab+0x9/0x20 [ 432.711912][ T9501] __kmem_cache_alloc_node+0x2f7/0x340 03:29:59 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = geteuid() read$FUSE(r0, &(0x7f0000004a80)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffff9c, &(0x7f00000000c0), 0x800c0, 0x0) write$FUSE_ENTRY(r5, &(0x7f0000000000)={0x90, 0x0, r1, {0x3, 0x3, 0x8, 0xf8a, 0x0, 0x7, {0x3, 0x7fff, 0x0, 0x3ff, 0x5, 0x7222, 0x9, 0xac, 0xab, 0x1000, 0x3, r3, r4, 0x8001, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, 0x0) read$FUSE(r0, &(0x7f000000b240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$btrfs_control(0xffffff9c, &(0x7f0000000640), 0xc807, 0x0) r10 = openat$ptp0(0xffffff9c, &(0x7f0000000840), 0x8001, 0x0) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r12 = openat$full(0xffffff9c, &(0x7f0000000880), 0x30b61e53a8a905c7, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r13, 0x8933, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r15, 0x8933, 0x0) read$FUSE(r0, &(0x7f000000d280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r17 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r17, 0x8933, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x100, 0x1000, r5, 0x800, '\x00', 0x0, r5, 0x3, 0x4, 0x3, 0x6}, 0x48) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x200, 0x1, 0x80000001, 0x640, r5, 0x7ff, '\x00', 0x0, r5, 0x4, 0x3, 0x1, 0xc}, 0x48) read$FUSE(r0, &(0x7f000000f2c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r21 = geteuid() r22 = getegid() read$FUSE(r5, &(0x7f0000011300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r5, &(0x7f0000013340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(r7, &(0x7f00000009c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)=[{&(0x7f0000000180)={0x290, 0x21, 0x800, 0x70bd28, 0x25dfdbfd, "", [@generic="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", @generic="475fbdc6000197d4657b02a43cf7b74a978a708289fb1cbe0b608a986e20ed91e0395441d3b512e069baca241d0caa5fb905b5251d4785e0d066387599166a978a311b86fe222aeffe649f2dabafe6510ab6e1a22ad73af195dd29fdb074927d8f8aebbaff93d0b21fb1a871955b2d2b9db79e23abba391957ae2317aeeb9740d3554ac017f41819820b19593918128fc2d27d2409312f168754e204d9001a569753630529181be16e88074a1e5274cf3fe5847d792df500b998622f1b0e1ec82dbf5fede84b5f54b2a1dded62e0ee9feffa5a2408c24a40008e0b9fd0d2d3a9355a9c3e", @typed={0x8, 0x33, 0x0, 0x0, @pid=r2}, @typed={0xc, 0x2e, 0x0, 0x0, @u64=0x3}, @generic="9ec5a3eab352fffa658786c77240b5ae3bf138ffbef1dd57dca85be6bbba005df3f7353586a677910f417d5f6283fb949156c78e3ae466a0fc4d52e086d864d2997e7f80d66dc415606ef954c6565c2bd3c6e905b5ea88acb00a29b1c361368521bdd221a6274175c959d0ceba67805d76664a557f55c563f0a14ebbc6f3b90ce41d8bd2906733613cb574969b"]}, 0x290}, {&(0x7f0000006ac0)={0x1244, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, "", [@generic="42dc1f1c6d5c092803433b23fc969df7a27e8356c5bf7592e976fd72bf8fea5c8f5162ba2d2b46df51af48be564773fbb3435aa4ad0edebd2df67e41a948ee48b1eb4772166b7b492119cf910eea2130170e61946d9be2b8626c06fbd197117c246e0275d6523bdd468a88cf1b350427c94a54555a64b5f9b76d0b92810a16154d038dc0c1681aa896d5a3e0e6fccc7afc92f0d8e19041a7a7192f23a483ff90b6e1dd3c47d76f5ceac6e9fcf8034d13756a505a873ee6a46bbc6ab3493182241601f7276379dc535532139af3d7742abd306b007b9d9d4a43c008", @typed={0xe, 0x1d, 0x0, 0x0, @str='/dev/full\x00'}, @generic="14c4461964487b893a1fc49427254a42a0b6a1fa5b7af009f7", @generic="9f5e97c43824150d5906df94be3f191743415af25e3aaa81343775d3cd17dcb48dac6b8217ccf9a8fdeb5123e0de375d75f6d8042bc32f488e514a96bda9d626fa9f9c7e868bc79b6218f0d0ccf09099704adab132c129f940f844cec18155e7410d140de4e93377001c14695d99de", @nested={0x10c0, 0x7e, 0x0, 0x1, [@typed={0x4, 0x86}, @generic="92b3eb418aa047d7fa3a4e0bb8221388c43a07d3a33f21ed2429db119e5659cc918f47d1d4e4708d5c3cadb28904ae6a0f4b6495c24cc6a2266d4a8f751c4c377dcddb0bec95d392761eee6b068084bfa6e4e23d999896a18e609632a3a223ef25141da3eacb4b8fe06a2071ed2b31803e24a77145324efb0502ed261c194d12b01f769e39f92e657ea0a47383bf51351413047c07e59016b851f3b66651c24863344a3ef04220021d814af018d044cebe9dcb6a12da6d91", @generic="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"]}]}, 0x1244}, {&(0x7f0000007d40)={0x34ec, 0x31, 0x400, 0x70bd28, 0x25dfdbff, "", [@generic="551d5104d97ed214cdf6b78030a47bec93486f1ae75935bd16564ee36e9902410594cfb9f8950c3ec3f68217ea54864bc9aea9ea3ef5f0f407b6a1c5916bed61b52892681b5a99586a4f3ca07bb1c982b6ca13dc740ea6338074950d32f5ef", @nested={0x11d0, 0x36, 0x0, 0x1, [@typed={0x4, 0x96}, @generic="6e65b9b0c014b669c76232365dd926daab2c052caa0c9a9fe8ce2543061f6f9d32e967c9c072e3b0ac3806be9ff293525823fe3cc6d94b5bb90f01425e2715170bc8d5f04aa343e5ce8bffae7d034d9b6a08fc40bd4536a357c39871217dbd0f338e9a89a36e5d2f2084f22e1f706129b70f8aae48dce8a3d60a7ed12ecc51cde839f458830169e4f2944e741644496a7b3d64b2e0e280724089d1", @typed={0x1004, 0x87, 0x0, 0x0, @binary="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"}, @typed={0x4, 0x88}, @generic="4eaa1215eef4374849047ba1db07590d49cc7b7bcbe12cd0418a8e91a6be403080be9ea69f6f2a951a52294f1d8235ea63b738ca7de188537b80647b173d1e27045a69dc192dfc52d7ddc6decab0bbe4200912762ae6677c21a330c80c5fa60a380f4bb974e88167cd327bf7fe390179d2c804649ae76ff535a08c15168811f9468cae9afdc9d3037f967319b4ecfe0916827a22e8a23ebb9c52dd3bfe47ccdedc103fd8e3142caa567615cc765076a3b67b898045b17c87694ed3c574d911d2fe51def40ec670ccb3", @typed={0x50, 0x5, 0x0, 0x0, @binary="ac22934958f7a1a55da0ff3140cdcd62c46e5842aebbeee58bb93a6367b05e73b1498d827c0683a552d8f70bbc80eaed6901d0dda37293c695103d42835635ab328572946089e29791552a60"}, @typed={0xc, 0x4c, 0x0, 0x0, @u64=0x2ecc0000}]}, @typed={0x4, 0x7d}, @typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@private1}, @nested={0x10f4, 0x5b, 0x0, 0x1, [@typed={0xe2, 0x34, 0x0, 0x0, @binary="014cd3ee4511d6970abb62d5615cd321524ad52f59fc3276557bab617beac6217384b0de44b33bccefa523f74a0666b31ce431329a687bf49cf0f9045e1dfb736f383210a7763ea88323a737791997dceb4802b9932feb6f76df96154029ec67e499d939865190a30284fff00e7c5a6245d64cf4e2746f3133c30847a420c2bec1b76d3fd888a9426b000dd8741a293637f77213173dd306504862ffa6bd351388b6f4759869563da9f92a5339a057ddbbc81a6aa57f09b797e8509e106350fd97a7ec8ff25fe88b38bb0cecb0f60b8bb718ee079d61eb54a3a40f01b879"}, @typed={0xc, 0x18, 0x0, 0x0, @u64=0x3ff}, @generic="f5605636496dfd123a2a3deb0cf31cf2459b318a50a6adc9d07d71776909983b26b48cf04d3918949d9f34d329abd960ae8e939ad265d653a33ba08103b6227a1997a06008175419dddd034bad533e984300fb97043d6d69b4e758b999ded9f135a7bc25200a411efc77d2b7f8ee34bb0186fff0905bccd78765ae6cddb91cc5aa57ef82090690f67c4be81408913551ab2f7a8fe723b55f9aa1d6e317954f9e76b9bb76b08fefa4a97ce973fa7d6510997b2a5a35fdf89c29224e26c0284a9ba2a2f1ebd75d4fec03004f11726146246757971a916cddc6156cf0e99b4be1457344731f739c0e69bdd4459b6a0d20073d2c9bafcc81a2676f788d3b53abb23e01857b3ee4e79d41284aafd76e064455344b8bb676ea5e58684aec945cb01379c1491c6f8a15094e5c367ff66d9cecc35ab142b53d841e1d549f9f0fdb9a5db208a155ac84b61424a2796fb93a2b0ba7c8f6d3c4919ed6b2749b19b4dd1207330b8e20218630664b6b00bb46ffabb471fbf00992867dde6370464d0210f421ab117c31606c7b22ed4a0b168cb090f4e9b54f7be6cd106d4313617c1aaf700c2aee9b297fed051e29ced2d3e78a8ed3f7229a60f2efca27cc90f17ea2072968d5877812409a5eea6080c2fb88ad11b9ed9e27a2e1f953b7b132d94c44f3e6d177582b5fdebfb12e9b88ccd92fc224f423b073514c938ec645a0b44758b2a7e12757868f9a568ab6b5ef256c02d3bc02efe8fbafcf78843e7bfcf064197ded10fbed1c9b29c7da3b5bf00f367b86bc989eb27c5608208021940575248694cf884167fec1446db78a95dab14fd82e5405d3f10401e6151aacd860e586ec1bf9ce00071e2c1d328fb010dcb18625a7f9044ccf3d1971c833f937c9dc77244f98e6da2587e156cc9f117c03a41a76aeea55cf39a41603c542cfc629eb8d1943d30a0e8055b083fe21294a2116ad2a6eee09502aea332dbc5b6ed211268c6dc5647f099edebf81fd31e8234462a976903ce5695b8669a29c673671c52f2ed841c9d763458daaace88a4934fd1bee55d529387ca7d2ba46027510c93c5eaff1c511c36bdc6bea02dc83336fc18a2841d618b87ba382e0c4984e26e0d83e4c2c2b1e58a492d9e6862cc771417b4c01d67bc312785284372c96a4a150c8e0f9d2c767010be3259cc9a52ee9de694b108f94b4d6c56e02ae8dc6101ef90d67eda283e19207596d43e5cdb35bd5220fbdf4f2604e024b93d5a30890e7185ac946e3d5bb72c595ebaca387d281566e48d3e5c03c5b418c683d1fdaeabc661ba2b4f5100c9d5d718e519bbad966713f98a5c8454e7ad305531a4222d4d39ee63acb8a3d752214de4b0cb95d23a6d9d3cc6c8c1879d67bfaa87145fedb95596a9165b96bb2e7f7e58de6d61dbf55817ddbbcdf6936b28cb3c07477bc55cd5d9679359ec6e2532718d051a84b209edf9c10453a7f9909e5053c5edacd0350c361402c2f6b3eed3ff4b5c37a2282afa7a2d3c6f93ee40bf6cb35bae0d9e478a41bc790f5bd4c3b6aa3b263f7ddc53f291da110bcf6bb8bb27f357230586b748a93b1a4c23776dc2e4cfd9d04177cc60d1f796ac15f85d17a02083dbb6a0b2e58c586283ae2025c3b1fe7bd9c7e43ecd7289145cd9f6e5a2442ebf4cd24a86787cb93cf67b5487dc33f4eadabd6657f96176b7be34916df8e62737466b667b1c756c684c0c1134f82f232714cd1d2e5b0506d60738441c2f152f7bcd5ec575a70b64af0bb24ff54fb03dcff3de5105798fe840813a4c082209bfc91ab18ed857e6d0af5ffb2734532e164447398e59fef7343a4a48dcf327e124bfe0e03baf3af05287e0a9fffa2a8c4c4bd5c0bb52694260ab7bd6b51a849c55d575fe259f474d6d1ac08c31548508475e1a26a231876bf0a1c651ff6c8e23c5df9656cee8e7c88cd93d5cdb927671e69374eb38bdb3614bbf37adaeff27fb12cc235533e5d9e4c6ba696dfb82a6353e88f6983dc4da9a5c75da3fdf47aafc0561453411f94b4b822630c34a17a3d4adfb599fc0e87d0d3dc22641c8c0eebc6eddc73bbf45e8dfe050efec4dc1d38fca6594219123dd4d614bb77200f159b16c8d679dcb9eb3f7a9650362ef60757dcff9b43a76eaec9b88930b0f78040e16440fbda28a176733bb37a181f411ef3afed974b847f5ec51612d23a4d2d474a86fca666486c84862a3fcee11ab0e411c91e045c31aa94c67b72b59684757a9d50350abc37a00f90268bc4236f53488ed6ab33751e37da725092b1153e76a2fb11f9ed9df73880aeeff5a9e247721de1b38e0545850acd2a8dcd07126fd69e2ca37c430551044f3d7741ea5eb9c82fe63574a7e5b802e500721365e47aebaff6990ec9694dfc80697035bd1af0395e1e61234ef2188048b155c8de59c8bf53fa72bc0f0e0570981a82779e59daf9bb5ae963f2f3f082027d0769c66e84955620413961c34e476a025aff4e9d797c4b3482d36554bdc99014d0bf63f0a4881b4a43d1ccbfec0ef57a5c87f1e5f97543802f11ecd13fa8388edfb696c42effcf816624534db33646b58b9bd2944d9cb03a7df74877392d1cd4f38ab25223dca1360885f3f1b48c1a4a116b2dd996d9717e794f73efcc8f380d142e9e68e3f173e48a67574c62a4b6477d4591648984a9845f556d85839727f4f2949936b27af02f2cb29c09ff79b9d2530bd8a712127e63f161d94fba779875482ffe56b06111f4448dd4893eac76bbd11e1b29fac23b346c7ab0338d667240738d9bdc11b91c9b7b5b88bbe0a7fdd07ee99eab13ef277163aa0ac39ae1a7add575f27949cd786c86ac9945324d204ee9aeffa526aef9aa09d1a2e5a09cf010cab8a34c91f42b0b8b9726a674517d493633cb98911fc66629f96ac8cd73dfc9567eeb0d720761096e0b84a7c69e353793eeb55ba04c38cb27bf666c5ff00a1dc94612f3a36237c60253712530246d976a43c0e0492b347e35a4c99b5f6255d2d4421c2559d6bad5be742a9c91420374c08e47beaa02e423d121b3dbccc169cd595080df91d1ce308005bbb5f1071d5233c176b3e6968bba4e310eceb3943f354508a25d1d8cafcf99fb1d11f0ca08bf000c526daaf8efe7a07803f2c0191ec74e83335a9f9cbe4d2d5918a86c0d1562351c70e34e2f9acf2a81a00ec5aed28b9e86fb0d82b21bcbeea7af5cc7e91f1feec0d3ab4278b3aee12d925248174d92624f927990d5a493b9d23bf0e12005614587d39385f0138d2fd9893f27bc02d311148d9358e419392338077038668e6240f5d8c6062d624b6d60ff742ac81c3da0595c39f0f76c7a058983b5b4caf3651d17e38c70ee97ba9968a82eeec1383d56ce3465696575774f0163b5aa55dcb15ac528159b9d57e9e7ab466944cad1e32a575276be79834b48256e66121277f4682ce4cd7c420b4c27c97df4e30edb11dce6149a9088cd943f4222c35bcddf51a072e238368e0a281f0debe9a029d71dee9f75355e1ddd794ef7c4669777609c0ce0e7bdde49201ea29bde9c40940208f6cf53225d3f5fc782c68aa0877f812596772d0d1f01150d2cc7f76ad4605e674eec17840c536df73bb5b7d1febed31fb17d788d3ccc09100e6a06c857536079eee164e44ca18c8ee8b79469e6258d81bcb0bfa0837f567de32efca152e01463d7326e22937f9ae9f807a631c24a1705eb9fff82e7eaa2764ba76e2451a4dabe1dc06375819bfa2251c00e1c7f6c0a6e712266c5852fcc9f71bac93128891e323046d39a1dfda7c5f56b520c077a0164d1dfb2f3c3f645aa0bae91ce571d30413a7b1f8730b4080ea099efad1950a546559dc75ec5c407033809de8226b0a0b393bd983c0ff164c99d49a97c2ca49d98ac355e1f384341ae9a02d390270044b9ec8cbf788ead79a1245e51d0a35ee636ca6d833ab9e9faadf891953d34c7b4c62e38d44b9acfd0ae0949d8e734dc1f5f74a05ac17cfb3a0d6f3ea878ea1d8521a2e4d71829fb193769261272d66db596965fc4b313e771b61089c55a18b8b02c07b7bd42539f4a4425938ac38b71ff0224abddb09a472d7b168a59ee4810dd79557e198f588b7d5b4886984f4456061f45f054e966942929fcdbff35d9823f1c82ffb6bfaa9e68efd8792b0297b7eb5f27090dd9c77f481426f4e07cd423b7a1be2d18a3ea30704a338f6346984b824d591e088f76c86ea27648c7de6e518efc14890330c43b3c56049cbe88d70262fa79bbd234d966db4c74e3b3ed47fd87c8f0ffab1c99bb8e89d30969e6a39ff5ace5d05a3bbb9af9a16aa15334de7f70c31cde0713c2877e3af01b54f00b1318553910700bdaa5f7efbbf43379100cfa0dfeead6b8df5a75890534a43fef4ab9920189a2b5614a1abcd348c35306d875ac65e98222f272aef37d9b294dda99de46a335c5dd4368ac770c1cfe5e23e9d94def3b2fea04073f6830cd5b57ad1c2f8ef7cd0b565b629c8bc54e4ef0a3a5cff500a9d5a18af22312e19145e65a6703fbcc42a0393f001b4c1dd41b7ee3ab1ac391962ba1586168401bcd26a2c7ec29a341bdb0008d8ca6bcf2a2b3b4eb7209a00ebd94892b71ebc0628464464a79c0001e7b4e886090dbad11cecde712f63593414c56ef31802cd0b7c7efba68486258a7a2f26e12df659a3865d8c003d4e0302805588befc3a8993a594f6d8584c6c561e33dccd7c98ab743ce9d7aa1abc7ac12d24d80fc3e6f95396571601eada5a6435d090efc2008108bd9c5cc403304a61fc1023162daeb3e1b241867b2ec0f4019e8233c0bed20a68412d85e148f5f0c7f788160ac1417b5c1e403323b43484eee4afcace63f15afa7d9454575333dd273cee53551759906b2d8c1255d583c6654c55ce888fba9349ba7ec5d9f0a930bb38a84f3d88a4540e0a897a6f0e2ae3f6e6f47c6e886dc7fcb74bc6fb2a4667e215a4d098c0be8ee428bf2f80bf1924f9162a6fa1e549be79b62ba3ec8899543ffd53af927c980b3273dd1659efe555d9d4f261d6f7a9553c59844c4de1fea2186c045dd9e832a99299cab700b8521394e3094ce545e651fe10137bebf1380da4e6414010813208f530156747d03a64068e50627e7d78ae378ec52b85ea57595a5ee79a3c98baadc19f5bf696b35e0e9767afcbdcb5c7b56e06f59f7e622af2c1e20fce6c38a2710c1d903e4712de5981def845b06a403d3aaf55e143f35504738c402dc065bc81ae34b18358f2fc63f5c158447806b326c4e752cc7fdd305a24fd7e74f5b36ef26cfc5f4c6f67e5137417968c85b8501515cde07bb90c9309e7a9d5a4bce27ef0d4d26cc698be2325d4c2db1a96b2897ad3d917c959edbe693f9660330ed42677c79e04915a5cc8462859f0e7af942159e8842bbb410b9c1e7f4c9f07e7fd7bab021eb3b0cb008c32cdf36c1d369453f1d3cdc5096e3152630f6e3babf403f1fc8a4464882387f139f569ded7592e3c1325d21e8696bb397e88dbed538a813a742ab67a7bb01c1fe1d38985d8c822f25e242f1b5c23d4b6508eecf06ec8174f5b5af30dcde7bade711105bedd3af4e416adf5f54a49038daf76b6b70809975393d381c557cc2e5dc94a442d2fffd0f6b54f4a918586893d5e6005e46e7216baa4d9166dddeb40d131e8b7313f33c7bdd7439a8230956568bd0b0c2d915dc733bc336601143fed8181ee8774a408ae3d696e6936c429dc8b5a52c3262021e052f4a85feb6daeeda413b59564f8c2c96760224653de92038d837ed0a92e7043e83f54720e8ab97bff830563c8fd8055c5686"]}, @generic="86e4872c404ddf513382a92ed55c887664b7939cddd814", @nested={0x105c, 0x6c, 0x0, 0x1, [@generic="749096153e1397e86f2f868767c0113437b3dc", @generic="676ddbf02b85dbece284de7e75fc10adc94f7eee62c1485f85b439839e5a4be794d7b7e7ee9bf2fc873676255df5e7d0dd946b36d4d1a8367942dd7192", @typed={0x8, 0x72, 0x0, 0x0, @ipv4=@local}, @generic="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"]}, @nested={0x11d, 0x5e, 0x0, 0x1, [@typed={0x4, 0xe, 0x0, 0x0, @binary}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@loopback}, @generic="0fb3442c76be199a0766be9f06f25890f644c125dca5076088ad7240bdf60ea68b47e3373a3f593d138089d1cb4fd74616965363f290d12f8564c905a3afdeffc2c5d92aa6ddef3cc964a34f5018586e964886440d37ba02850a0ac0e24065a69d2ca1ef849877e5031fdf92b434584c86", @typed={0x8, 0x57, 0x0, 0x0, @u32=0x9}, @typed={0xc, 0x50, 0x0, 0x0, @u64}, @typed={0x7d, 0x49, 0x0, 0x0, @binary="4a05d8a9a85b6acb9659b89315ae1f84f6e58f6164bf5eb4210d2295251ff235521e6a3579a304d75a6efa119d1cd3eb3ac8424d18bb7750416f14a280ba80e5c0c8d4859a069bc715640d9ab44d28f61264e2b211ef67575ca8877790566a6fca3cc7f64142735bab58c9053ca966d2a65e1ff8bcbf028019"}, @typed={0x8, 0x34, 0x0, 0x0, @ipv4=@remote}]}, @typed={0xc, 0x20, 0x0, 0x0, @u64=0x80000001}]}, 0x34ec}, {&(0x7f0000000440)={0x84, 0x1b, 0x4, 0x70bd29, 0x25dfdbfe, "", [@typed={0x4, 0x41}, @generic="32e735ae5fee0a648008079d665b80b6b03745a6b5aa2bfd8762a7fe915713710b925c316cd577a3637b0abfb6b084eb2d9e4893d21531101f613a5f8d53a314d600311852e30b58026cbcbd48a1c11e68650a2d1c5c381b4539f0ff", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x84}, {&(0x7f0000000500)={0x1c, 0x36, 0x300, 0x70bd28, 0x25dfdbfe, "", [@typed={0xc, 0x55, 0x0, 0x0, @u64=0x6}]}, 0x1c}, {&(0x7f0000000540)={0xd0, 0x28, 0x800, 0x70bd25, 0x25dfdbfd, "", [@generic="f4904557e493831d8b", @nested={0x94, 0x60, 0x0, 0x1, [@typed={0x8f, 0x34, 0x0, 0x0, @binary="0c0fc83adf3df7d1273ad46f0cae9c1a8edb83861edd16fa4b18b527a61f8b54393e865c13f1625b21ac9f85a867c02d6bd9727d9196294abdbd1c87273727d08df64ddcf9199dbbcfb6e70bc896fbc34f0a54220b977c54929f456f6205019d439c359019162369ca22e7456a4e36e47a7c9e5eb94268a4d0e86fdb9cda55f677b4ebf2e959829828f2b9"}]}, @typed={0x8, 0x9, 0x0, 0x0, @pid=r8}, @generic="4af4627d5928821e06cc3a8d8f137c8036dc2ce1c99c95dfbcc2"]}, 0xd0}, {&(0x7f0000000680)={0x180, 0x3c, 0x100, 0x70bd27, 0x25dfdbfd, "", [@nested={0xa8, 0x4d, 0x0, 0x1, [@typed={0x8, 0x30, 0x0, 0x0, @fd=r9}, @generic="4278add34045215d30c07423efa1fe51da21aaa02862c135e7054fd484f5de433742cf28ec2f50e2d61634211472f15fb34c6965277326666dce8f297fa90ac4653723e406c247c9f9025388c5f4c5e7ae2e5bed0216cf306f7fa1580e49a2ab69cbaf2afd4cc4a6e8add786d5371d91052dbc5ba19d145709facff14ae16961", @generic="b9dbdee1d7f6c974b81ba886b0cc9ca8af73d43f895b0a77c9a5efb2"]}, @generic="616581858bc289832f5131e4e6410a483d02b8da19adc162dd55d7d79911f4a4d0a3f5076ce91fb581877307051420ec71bd79e6344d70760d89fc2c3360c50ed6f751ce4d2246733f5c98cee81a9df3c6b6e755a8eb5da6b35583f092548f1f4589fd0a0573e836cc99ec55211c9a432aa82ecaf85c735a1a5bc045a4a612aa1df3078ccc98d3f20fff18f43915d8f84a2f417fa8af66f8ea787c6bc315a345646af78da8a3fe352d45245240baa902e4d84214", @typed={0xc, 0x89, 0x0, 0x0, @u64=0xffffffffffffffff}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x6}]}, 0x180}], 0x7, &(0x7f0000015380)=[@rights={{0x1c, 0x1, 0x1, [r10, r11, r5, r12]}}, @rights={{0x20, 0x1, 0x1, [r13, r14, r0, r0, r15]}}, @cred={{0x18, 0x1, 0x2, {r2, r16, r6}}}, @rights={{0x14, 0x1, 0x1, [r0, r5]}}, @rights={{0x1c, 0x1, 0x1, [r17, r18, r19, r0]}}, @cred={{0x18, 0x1, 0x2, {r20, r21, r22}}}, @cred={{0x18, 0x1, 0x2, {r23, r3, r24}}}], 0xb4, 0x4000001}, 0x4000012) [ 432.714424][ T9501] ? kvm_dev_ioctl+0x9b6/0x1c20 [ 432.717006][ T9501] kmalloc_trace+0x25/0xe0 [ 432.718666][ T9501] kvm_dev_ioctl+0x9b6/0x1c20 [ 432.720418][ T9501] ? bit_wait_io_timeout+0x160/0x160 [ 432.722356][ T9501] ? __fget_files+0x272/0x410 [ 432.724104][ T9501] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.726078][ T9501] ? __fget_files+0x272/0x410 03:29:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 432.727816][ T9501] ? bpf_lsm_file_ioctl+0x9/0x10 [ 432.729743][ T9501] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.731722][ T9501] __do_compat_sys_ioctl+0x2bf/0x330 [ 432.733696][ T9501] __do_fast_syscall_32+0x61/0xe0 [ 432.735573][ T9501] do_fast_syscall_32+0x33/0x70 [ 432.737389][ T9501] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 432.739709][ T9501] RIP: 0023:0xf7f82579 [ 432.741223][ T9501] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 432.748240][ T9501] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 432.751294][ T9501] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 432.754200][ T9501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 432.757117][ T9501] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 432.760011][ T9501] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 432.762914][ T9501] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 432.765830][ T9501] 03:29:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 21) [ 432.800223][ T9511] FAULT_INJECTION: forcing a failure. [ 432.800223][ T9511] name failslab, interval 1, probability 0, space 0, times 0 03:29:59 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x8000, 0x20, 0x2, 0x1, {{0x23, 0x4, 0x0, 0x8, 0x8c, 0x66, 0x0, 0xb1, 0x29, 0x0, @local, @multicast2, {[@end, @timestamp={0x44, 0x8, 0xdd, 0x0, 0x9, [0xffffff23]}, @lsrr={0x83, 0x17, 0xc7, [@broadcast, @multicast1, @rand_addr=0x64010101, @remote, @multicast2]}, @timestamp_prespec={0x44, 0x14, 0x77, 0x3, 0x1, [{@local}, {@remote, 0x7}]}, @timestamp_prespec={0x44, 0x14, 0x3b, 0x3, 0x0, [{@multicast1, 0x5}, {@remote, 0x3}]}, @timestamp={0x44, 0xc, 0xc6, 0x0, 0x3, [0x4, 0x3000]}, @timestamp_addr={0x44, 0x24, 0xfb, 0x1, 0x0, [{@dev={0xac, 0x14, 0x14, 0x23}, 0x4}, {@local, 0x2}, {@multicast1}, {@remote, 0x5}]}]}}}}}) [ 432.804762][ T9511] CPU: 0 PID: 9511 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:29:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 432.808631][ T9511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 432.812420][ T9511] Call Trace: [ 432.813638][ T9511] [ 432.814715][ T9511] dump_stack_lvl+0x125/0x1b0 [ 432.816453][ T9511] should_fail_ex+0x496/0x5b0 [ 432.818157][ T9511] should_failslab+0x9/0x20 [ 432.819902][ T9511] __kmem_cache_alloc_node+0x2f7/0x340 [ 432.821880][ T9511] ? kvm_dev_ioctl+0x9b6/0x1c20 [ 432.823640][ T9511] kmalloc_trace+0x25/0xe0 [ 432.825265][ T9511] kvm_dev_ioctl+0x9b6/0x1c20 [ 432.826972][ T9511] ? bit_wait_io_timeout+0x160/0x160 03:29:59 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x8000, 0x20, 0x2, 0x1, {{0x23, 0x4, 0x0, 0x8, 0x8c, 0x66, 0x0, 0xb1, 0x29, 0x0, @local, @multicast2, {[@end, @timestamp={0x44, 0x8, 0xdd, 0x0, 0x9, [0xffffff23]}, @lsrr={0x83, 0x17, 0xc7, [@broadcast, @multicast1, @rand_addr=0x64010101, @remote, @multicast2]}, @timestamp_prespec={0x44, 0x14, 0x77, 0x3, 0x1, [{@local}, {@remote, 0x7}]}, @timestamp_prespec={0x44, 0x14, 0x3b, 0x3, 0x0, [{@multicast1, 0x5}, {@remote, 0x3}]}, @timestamp={0x44, 0xc, 0xc6, 0x0, 0x3, [0x4, 0x3000]}, @timestamp_addr={0x44, 0x24, 0xfb, 0x1, 0x0, [{@dev={0xac, 0x14, 0x14, 0x23}, 0x4}, {@local, 0x2}, {@multicast1}, {@remote, 0x5}]}]}}}}}) [ 432.829097][ T9511] ? __fget_files+0x272/0x410 03:29:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x20000850) [ 432.830964][ T9511] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.833197][ T9511] ? __fget_files+0x272/0x410 [ 432.834929][ T9511] ? bpf_lsm_file_ioctl+0x9/0x10 [ 432.836736][ T9511] ? kvm_vcpu_stats_release+0x80/0x80 [ 432.838666][ T9511] __do_compat_sys_ioctl+0x2bf/0x330 [ 432.840604][ T9511] __do_fast_syscall_32+0x61/0xe0 [ 432.842413][ T9511] do_fast_syscall_32+0x33/0x70 [ 432.844180][ T9511] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 432.846448][ T9511] RIP: 0023:0xf7f82579 03:29:59 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x8000, 0x20, 0x2, 0x1, {{0x23, 0x4, 0x0, 0x8, 0x8c, 0x66, 0x0, 0xb1, 0x29, 0x0, @local, @multicast2, {[@end, @timestamp={0x44, 0x8, 0xdd, 0x0, 0x9, [0xffffff23]}, @lsrr={0x83, 0x17, 0xc7, [@broadcast, @multicast1, @rand_addr=0x64010101, @remote, @multicast2]}, @timestamp_prespec={0x44, 0x14, 0x77, 0x3, 0x1, [{@local}, {@remote, 0x7}]}, @timestamp_prespec={0x44, 0x14, 0x3b, 0x3, 0x0, [{@multicast1, 0x5}, {@remote, 0x3}]}, @timestamp={0x44, 0xc, 0xc6, 0x0, 0x3, [0x4, 0x3000]}, @timestamp_addr={0x44, 0x24, 0xfb, 0x1, 0x0, [{@dev={0xac, 0x14, 0x14, 0x23}, 0x4}, {@local, 0x2}, {@multicast1}, {@remote, 0x5}]}]}}}}}) [ 432.847918][ T9511] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 432.854958][ T9511] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 432.857966][ T9511] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 432.860942][ T9511] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 432.863776][ T9511] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 432.866764][ T9511] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 432.869718][ T9511] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 432.872610][ T9511] 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x20000850) 03:30:00 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 22) 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff71) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r1, 0x2f, 0x1, 0x7, 0x4, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}, 0x7800, 0x8000, 0x4, 0x10001}}) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = geteuid() read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000004a80)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$full(0xffffff9c, &(0x7f00000000c0), 0x800c0, 0x0) (async) r5 = openat$full(0xffffff9c, &(0x7f00000000c0), 0x800c0, 0x0) write$FUSE_ENTRY(r5, &(0x7f0000000000)={0x90, 0x0, r1, {0x3, 0x3, 0x8, 0xf8a, 0x0, 0x7, {0x3, 0x7fff, 0x0, 0x3ff, 0x5, 0x7222, 0x9, 0xac, 0xab, 0x1000, 0x3, r3, r4, 0x8001, 0x7}}}, 0x90) (async) write$FUSE_ENTRY(r5, &(0x7f0000000000)={0x90, 0x0, r1, {0x3, 0x3, 0x8, 0xf8a, 0x0, 0x7, {0x3, 0x7fff, 0x0, 0x3ff, 0x5, 0x7222, 0x9, 0xac, 0xab, 0x1000, 0x3, r3, r4, 0x8001, 0x7}}}, 0x90) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, 0x0) read$FUSE(r0, &(0x7f000000b240)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f000000b240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$btrfs_control(0xffffff9c, &(0x7f0000000640), 0xc807, 0x0) openat$ptp0(0xffffff9c, &(0x7f0000000840), 0x8001, 0x0) (async) r10 = openat$ptp0(0xffffff9c, &(0x7f0000000840), 0x8001, 0x0) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$full(0xffffff9c, &(0x7f0000000880), 0x30b61e53a8a905c7, 0x0) (async) r12 = openat$full(0xffffff9c, &(0x7f0000000880), 0x30b61e53a8a905c7, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r13, 0x8933, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r15, 0x8933, 0x0) read$FUSE(r0, &(0x7f000000d280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) socket$nl_generic(0x10, 0x3, 0x10) (async) r17 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r17, 0x8933, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x100, 0x1000, r5, 0x800, '\x00', 0x0, r5, 0x3, 0x4, 0x3, 0x6}, 0x48) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x200, 0x1, 0x80000001, 0x640, r5, 0x7ff, '\x00', 0x0, r5, 0x4, 0x3, 0x1, 0xc}, 0x48) read$FUSE(r0, &(0x7f000000f2c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r21 = geteuid() r22 = getegid() read$FUSE(r5, &(0x7f0000011300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r5, &(0x7f0000013340)={0x2020}, 0x2020) (async) read$FUSE(r5, &(0x7f0000013340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(r7, &(0x7f00000009c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)=[{&(0x7f0000000180)={0x290, 0x21, 0x800, 0x70bd28, 0x25dfdbfd, "", [@generic="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", @generic="475fbdc6000197d4657b02a43cf7b74a978a708289fb1cbe0b608a986e20ed91e0395441d3b512e069baca241d0caa5fb905b5251d4785e0d066387599166a978a311b86fe222aeffe649f2dabafe6510ab6e1a22ad73af195dd29fdb074927d8f8aebbaff93d0b21fb1a871955b2d2b9db79e23abba391957ae2317aeeb9740d3554ac017f41819820b19593918128fc2d27d2409312f168754e204d9001a569753630529181be16e88074a1e5274cf3fe5847d792df500b998622f1b0e1ec82dbf5fede84b5f54b2a1dded62e0ee9feffa5a2408c24a40008e0b9fd0d2d3a9355a9c3e", @typed={0x8, 0x33, 0x0, 0x0, @pid=r2}, @typed={0xc, 0x2e, 0x0, 0x0, @u64=0x3}, @generic="9ec5a3eab352fffa658786c77240b5ae3bf138ffbef1dd57dca85be6bbba005df3f7353586a677910f417d5f6283fb949156c78e3ae466a0fc4d52e086d864d2997e7f80d66dc415606ef954c6565c2bd3c6e905b5ea88acb00a29b1c361368521bdd221a6274175c959d0ceba67805d76664a557f55c563f0a14ebbc6f3b90ce41d8bd2906733613cb574969b"]}, 0x290}, {&(0x7f0000006ac0)={0x1244, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, "", [@generic="42dc1f1c6d5c092803433b23fc969df7a27e8356c5bf7592e976fd72bf8fea5c8f5162ba2d2b46df51af48be564773fbb3435aa4ad0edebd2df67e41a948ee48b1eb4772166b7b492119cf910eea2130170e61946d9be2b8626c06fbd197117c246e0275d6523bdd468a88cf1b350427c94a54555a64b5f9b76d0b92810a16154d038dc0c1681aa896d5a3e0e6fccc7afc92f0d8e19041a7a7192f23a483ff90b6e1dd3c47d76f5ceac6e9fcf8034d13756a505a873ee6a46bbc6ab3493182241601f7276379dc535532139af3d7742abd306b007b9d9d4a43c008", @typed={0xe, 0x1d, 0x0, 0x0, @str='/dev/full\x00'}, @generic="14c4461964487b893a1fc49427254a42a0b6a1fa5b7af009f7", @generic="9f5e97c43824150d5906df94be3f191743415af25e3aaa81343775d3cd17dcb48dac6b8217ccf9a8fdeb5123e0de375d75f6d8042bc32f488e514a96bda9d626fa9f9c7e868bc79b6218f0d0ccf09099704adab132c129f940f844cec18155e7410d140de4e93377001c14695d99de", @nested={0x10c0, 0x7e, 0x0, 0x1, [@typed={0x4, 0x86}, @generic="92b3eb418aa047d7fa3a4e0bb8221388c43a07d3a33f21ed2429db119e5659cc918f47d1d4e4708d5c3cadb28904ae6a0f4b6495c24cc6a2266d4a8f751c4c377dcddb0bec95d392761eee6b068084bfa6e4e23d999896a18e609632a3a223ef25141da3eacb4b8fe06a2071ed2b31803e24a77145324efb0502ed261c194d12b01f769e39f92e657ea0a47383bf51351413047c07e59016b851f3b66651c24863344a3ef04220021d814af018d044cebe9dcb6a12da6d91", @generic="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"]}]}, 0x1244}, {&(0x7f0000007d40)={0x34ec, 0x31, 0x400, 0x70bd28, 0x25dfdbff, "", [@generic="551d5104d97ed214cdf6b78030a47bec93486f1ae75935bd16564ee36e9902410594cfb9f8950c3ec3f68217ea54864bc9aea9ea3ef5f0f407b6a1c5916bed61b52892681b5a99586a4f3ca07bb1c982b6ca13dc740ea6338074950d32f5ef", @nested={0x11d0, 0x36, 0x0, 0x1, [@typed={0x4, 0x96}, @generic="6e65b9b0c014b669c76232365dd926daab2c052caa0c9a9fe8ce2543061f6f9d32e967c9c072e3b0ac3806be9ff293525823fe3cc6d94b5bb90f01425e2715170bc8d5f04aa343e5ce8bffae7d034d9b6a08fc40bd4536a357c39871217dbd0f338e9a89a36e5d2f2084f22e1f706129b70f8aae48dce8a3d60a7ed12ecc51cde839f458830169e4f2944e741644496a7b3d64b2e0e280724089d1", @typed={0x1004, 0x87, 0x0, 0x0, @binary="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"}, @typed={0x4, 0x88}, @generic="4eaa1215eef4374849047ba1db07590d49cc7b7bcbe12cd0418a8e91a6be403080be9ea69f6f2a951a52294f1d8235ea63b738ca7de188537b80647b173d1e27045a69dc192dfc52d7ddc6decab0bbe4200912762ae6677c21a330c80c5fa60a380f4bb974e88167cd327bf7fe390179d2c804649ae76ff535a08c15168811f9468cae9afdc9d3037f967319b4ecfe0916827a22e8a23ebb9c52dd3bfe47ccdedc103fd8e3142caa567615cc765076a3b67b898045b17c87694ed3c574d911d2fe51def40ec670ccb3", @typed={0x50, 0x5, 0x0, 0x0, @binary="ac22934958f7a1a55da0ff3140cdcd62c46e5842aebbeee58bb93a6367b05e73b1498d827c0683a552d8f70bbc80eaed6901d0dda37293c695103d42835635ab328572946089e29791552a60"}, @typed={0xc, 0x4c, 0x0, 0x0, @u64=0x2ecc0000}]}, @typed={0x4, 0x7d}, @typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@private1}, @nested={0x10f4, 0x5b, 0x0, 0x1, [@typed={0xe2, 0x34, 0x0, 0x0, @binary="014cd3ee4511d6970abb62d5615cd321524ad52f59fc3276557bab617beac6217384b0de44b33bccefa523f74a0666b31ce431329a687bf49cf0f9045e1dfb736f383210a7763ea88323a737791997dceb4802b9932feb6f76df96154029ec67e499d939865190a30284fff00e7c5a6245d64cf4e2746f3133c30847a420c2bec1b76d3fd888a9426b000dd8741a293637f77213173dd306504862ffa6bd351388b6f4759869563da9f92a5339a057ddbbc81a6aa57f09b797e8509e106350fd97a7ec8ff25fe88b38bb0cecb0f60b8bb718ee079d61eb54a3a40f01b879"}, @typed={0xc, 0x18, 0x0, 0x0, @u64=0x3ff}, @generic="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"]}, @generic="86e4872c404ddf513382a92ed55c887664b7939cddd814", @nested={0x105c, 0x6c, 0x0, 0x1, [@generic="749096153e1397e86f2f868767c0113437b3dc", @generic="676ddbf02b85dbece284de7e75fc10adc94f7eee62c1485f85b439839e5a4be794d7b7e7ee9bf2fc873676255df5e7d0dd946b36d4d1a8367942dd7192", @typed={0x8, 0x72, 0x0, 0x0, @ipv4=@local}, @generic="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"]}, @nested={0x11d, 0x5e, 0x0, 0x1, [@typed={0x4, 0xe, 0x0, 0x0, @binary}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@loopback}, @generic="0fb3442c76be199a0766be9f06f25890f644c125dca5076088ad7240bdf60ea68b47e3373a3f593d138089d1cb4fd74616965363f290d12f8564c905a3afdeffc2c5d92aa6ddef3cc964a34f5018586e964886440d37ba02850a0ac0e24065a69d2ca1ef849877e5031fdf92b434584c86", @typed={0x8, 0x57, 0x0, 0x0, @u32=0x9}, @typed={0xc, 0x50, 0x0, 0x0, @u64}, @typed={0x7d, 0x49, 0x0, 0x0, @binary="4a05d8a9a85b6acb9659b89315ae1f84f6e58f6164bf5eb4210d2295251ff235521e6a3579a304d75a6efa119d1cd3eb3ac8424d18bb7750416f14a280ba80e5c0c8d4859a069bc715640d9ab44d28f61264e2b211ef67575ca8877790566a6fca3cc7f64142735bab58c9053ca966d2a65e1ff8bcbf028019"}, @typed={0x8, 0x34, 0x0, 0x0, @ipv4=@remote}]}, @typed={0xc, 0x20, 0x0, 0x0, @u64=0x80000001}]}, 0x34ec}, {&(0x7f0000000440)={0x84, 0x1b, 0x4, 0x70bd29, 0x25dfdbfe, "", [@typed={0x4, 0x41}, @generic="32e735ae5fee0a648008079d665b80b6b03745a6b5aa2bfd8762a7fe915713710b925c316cd577a3637b0abfb6b084eb2d9e4893d21531101f613a5f8d53a314d600311852e30b58026cbcbd48a1c11e68650a2d1c5c381b4539f0ff", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x84}, {&(0x7f0000000500)={0x1c, 0x36, 0x300, 0x70bd28, 0x25dfdbfe, "", [@typed={0xc, 0x55, 0x0, 0x0, @u64=0x6}]}, 0x1c}, {&(0x7f0000000540)={0xd0, 0x28, 0x800, 0x70bd25, 0x25dfdbfd, "", [@generic="f4904557e493831d8b", @nested={0x94, 0x60, 0x0, 0x1, [@typed={0x8f, 0x34, 0x0, 0x0, @binary="0c0fc83adf3df7d1273ad46f0cae9c1a8edb83861edd16fa4b18b527a61f8b54393e865c13f1625b21ac9f85a867c02d6bd9727d9196294abdbd1c87273727d08df64ddcf9199dbbcfb6e70bc896fbc34f0a54220b977c54929f456f6205019d439c359019162369ca22e7456a4e36e47a7c9e5eb94268a4d0e86fdb9cda55f677b4ebf2e959829828f2b9"}]}, @typed={0x8, 0x9, 0x0, 0x0, @pid=r8}, @generic="4af4627d5928821e06cc3a8d8f137c8036dc2ce1c99c95dfbcc2"]}, 0xd0}, {&(0x7f0000000680)={0x180, 0x3c, 0x100, 0x70bd27, 0x25dfdbfd, "", [@nested={0xa8, 0x4d, 0x0, 0x1, [@typed={0x8, 0x30, 0x0, 0x0, @fd=r9}, @generic="4278add34045215d30c07423efa1fe51da21aaa02862c135e7054fd484f5de433742cf28ec2f50e2d61634211472f15fb34c6965277326666dce8f297fa90ac4653723e406c247c9f9025388c5f4c5e7ae2e5bed0216cf306f7fa1580e49a2ab69cbaf2afd4cc4a6e8add786d5371d91052dbc5ba19d145709facff14ae16961", @generic="b9dbdee1d7f6c974b81ba886b0cc9ca8af73d43f895b0a77c9a5efb2"]}, @generic="616581858bc289832f5131e4e6410a483d02b8da19adc162dd55d7d79911f4a4d0a3f5076ce91fb581877307051420ec71bd79e6344d70760d89fc2c3360c50ed6f751ce4d2246733f5c98cee81a9df3c6b6e755a8eb5da6b35583f092548f1f4589fd0a0573e836cc99ec55211c9a432aa82ecaf85c735a1a5bc045a4a612aa1df3078ccc98d3f20fff18f43915d8f84a2f417fa8af66f8ea787c6bc315a345646af78da8a3fe352d45245240baa902e4d84214", @typed={0xc, 0x89, 0x0, 0x0, @u64=0xffffffffffffffff}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x6}]}, 0x180}], 0x7, &(0x7f0000015380)=[@rights={{0x1c, 0x1, 0x1, [r10, r11, r5, r12]}}, @rights={{0x20, 0x1, 0x1, [r13, r14, r0, r0, r15]}}, @cred={{0x18, 0x1, 0x2, {r2, r16, r6}}}, @rights={{0x14, 0x1, 0x1, [r0, r5]}}, @rights={{0x1c, 0x1, 0x1, [r17, r18, r19, r0]}}, @cred={{0x18, 0x1, 0x2, {r20, r21, r22}}}, @cred={{0x18, 0x1, 0x2, {r23, r3, r24}}}], 0xb4, 0x4000001}, 0x4000012) [ 433.655709][ T9533] FAULT_INJECTION: forcing a failure. [ 433.655709][ T9533] name failslab, interval 1, probability 0, space 0, times 0 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff71) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r1, 0x2f, 0x1, 0x7, 0x4, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}, 0x7800, 0x8000, 0x4, 0x10001}}) [ 433.662981][ T9533] CPU: 2 PID: 9533 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 433.667390][ T9533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 433.671299][ T9533] Call Trace: [ 433.672563][ T9533] [ 433.673666][ T9533] dump_stack_lvl+0x125/0x1b0 [ 433.675428][ T9533] should_fail_ex+0x496/0x5b0 [ 433.677187][ T9533] should_failslab+0x9/0x20 [ 433.678880][ T9533] __kmem_cache_alloc_node+0x2f7/0x340 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xffffffffffffff71) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', r1, 0x2f, 0x1, 0x7, 0x4, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}, 0x7800, 0x8000, 0x4, 0x10001}}) [ 433.680918][ T9533] ? kvm_dev_ioctl+0x9b6/0x1c20 [ 433.682944][ T9533] kmalloc_trace+0x25/0xe0 [ 433.684710][ T9533] kvm_dev_ioctl+0x9b6/0x1c20 [ 433.686436][ T9533] ? bit_wait_io_timeout+0x160/0x160 [ 433.688400][ T9533] ? __fget_files+0x272/0x410 [ 433.690243][ T9533] ? kvm_vcpu_stats_release+0x80/0x80 [ 433.692783][ T9533] ? __fget_files+0x272/0x410 [ 433.694953][ T9533] ? bpf_lsm_file_ioctl+0x9/0x10 [ 433.697052][ T9533] ? kvm_vcpu_stats_release+0x80/0x80 03:30:00 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 433.698984][ T9533] __do_compat_sys_ioctl+0x2bf/0x330 [ 433.701319][ T9533] __do_fast_syscall_32+0x61/0xe0 [ 433.703158][ T9533] do_fast_syscall_32+0x33/0x70 [ 433.705002][ T9533] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 433.707320][ T9533] RIP: 0023:0xf7f82579 [ 433.708847][ T9533] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 433.715937][ T9533] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 03:30:00 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 433.719694][ T9533] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 433.723453][ T9533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 433.726297][ T9533] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 433.729131][ T9533] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 433.732013][ T9533] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 433.734834][ T9533] 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, 0x0, 0x20000850) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = geteuid() (async) read$FUSE(r0, &(0x7f0000004a80)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$full(0xffffff9c, &(0x7f00000000c0), 0x800c0, 0x0) write$FUSE_ENTRY(r5, &(0x7f0000000000)={0x90, 0x0, r1, {0x3, 0x3, 0x8, 0xf8a, 0x0, 0x7, {0x3, 0x7fff, 0x0, 0x3ff, 0x5, 0x7222, 0x9, 0xac, 0xab, 0x1000, 0x3, r3, r4, 0x8001, 0x7}}}, 0x90) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, 0x0) (async) read$FUSE(r0, &(0x7f000000b240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r9 = openat$btrfs_control(0xffffff9c, &(0x7f0000000640), 0xc807, 0x0) (async) r10 = openat$ptp0(0xffffff9c, &(0x7f0000000840), 0x8001, 0x0) (async) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r12 = openat$full(0xffffff9c, &(0x7f0000000880), 0x30b61e53a8a905c7, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r13, 0x8933, 0x0) (async) r14 = socket$netlink(0x10, 0x3, 0x0) (async) r15 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r15, 0x8933, 0x0) (async) read$FUSE(r0, &(0x7f000000d280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r17 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r17, 0x8933, 0x0) r18 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x0, 0x3ff, 0x100, 0x1000, r5, 0x800, '\x00', 0x0, r5, 0x3, 0x4, 0x3, 0x6}, 0x48) (async) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x200, 0x1, 0x80000001, 0x640, r5, 0x7ff, '\x00', 0x0, r5, 0x4, 0x3, 0x1, 0xc}, 0x48) read$FUSE(r0, &(0x7f000000f2c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r21 = geteuid() r22 = getegid() read$FUSE(r5, &(0x7f0000011300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r5, &(0x7f0000013340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$netlink(r7, &(0x7f00000009c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)=[{&(0x7f0000000180)={0x290, 0x21, 0x800, 0x70bd28, 0x25dfdbfd, "", [@generic="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", @generic="475fbdc6000197d4657b02a43cf7b74a978a708289fb1cbe0b608a986e20ed91e0395441d3b512e069baca241d0caa5fb905b5251d4785e0d066387599166a978a311b86fe222aeffe649f2dabafe6510ab6e1a22ad73af195dd29fdb074927d8f8aebbaff93d0b21fb1a871955b2d2b9db79e23abba391957ae2317aeeb9740d3554ac017f41819820b19593918128fc2d27d2409312f168754e204d9001a569753630529181be16e88074a1e5274cf3fe5847d792df500b998622f1b0e1ec82dbf5fede84b5f54b2a1dded62e0ee9feffa5a2408c24a40008e0b9fd0d2d3a9355a9c3e", @typed={0x8, 0x33, 0x0, 0x0, @pid=r2}, @typed={0xc, 0x2e, 0x0, 0x0, @u64=0x3}, @generic="9ec5a3eab352fffa658786c77240b5ae3bf138ffbef1dd57dca85be6bbba005df3f7353586a677910f417d5f6283fb949156c78e3ae466a0fc4d52e086d864d2997e7f80d66dc415606ef954c6565c2bd3c6e905b5ea88acb00a29b1c361368521bdd221a6274175c959d0ceba67805d76664a557f55c563f0a14ebbc6f3b90ce41d8bd2906733613cb574969b"]}, 0x290}, {&(0x7f0000006ac0)={0x1244, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, "", [@generic="42dc1f1c6d5c092803433b23fc969df7a27e8356c5bf7592e976fd72bf8fea5c8f5162ba2d2b46df51af48be564773fbb3435aa4ad0edebd2df67e41a948ee48b1eb4772166b7b492119cf910eea2130170e61946d9be2b8626c06fbd197117c246e0275d6523bdd468a88cf1b350427c94a54555a64b5f9b76d0b92810a16154d038dc0c1681aa896d5a3e0e6fccc7afc92f0d8e19041a7a7192f23a483ff90b6e1dd3c47d76f5ceac6e9fcf8034d13756a505a873ee6a46bbc6ab3493182241601f7276379dc535532139af3d7742abd306b007b9d9d4a43c008", @typed={0xe, 0x1d, 0x0, 0x0, @str='/dev/full\x00'}, @generic="14c4461964487b893a1fc49427254a42a0b6a1fa5b7af009f7", @generic="9f5e97c43824150d5906df94be3f191743415af25e3aaa81343775d3cd17dcb48dac6b8217ccf9a8fdeb5123e0de375d75f6d8042bc32f488e514a96bda9d626fa9f9c7e868bc79b6218f0d0ccf09099704adab132c129f940f844cec18155e7410d140de4e93377001c14695d99de", @nested={0x10c0, 0x7e, 0x0, 0x1, [@typed={0x4, 0x86}, @generic="92b3eb418aa047d7fa3a4e0bb8221388c43a07d3a33f21ed2429db119e5659cc918f47d1d4e4708d5c3cadb28904ae6a0f4b6495c24cc6a2266d4a8f751c4c377dcddb0bec95d392761eee6b068084bfa6e4e23d999896a18e609632a3a223ef25141da3eacb4b8fe06a2071ed2b31803e24a77145324efb0502ed261c194d12b01f769e39f92e657ea0a47383bf51351413047c07e59016b851f3b66651c24863344a3ef04220021d814af018d044cebe9dcb6a12da6d91", @generic="2da90e5ec5c09a78829e0e2f4fff37b8a2dd3f380c3d28f9b89cb485fdadc85e219bbe7c9b9380f7e8d0b80a87cd73d48f07517ece9688dfbe663466066fdce2e7bb1b2ba252ff724e0121c7701710214f84066154cffe2f3563a36fd9e6e55b7e22c784a7f65f1dbf350f451dbebb3b57350c58cfa2e3ca24185f6c3fa99241d57bd45903c474015e4c3058582330845fdd79a90cf8e6e883a1c138b37872eb686798705ca0362689e5b2c8ba45125f27e885806036fc837a8eb0b54888e4b834e7577c8b077c0b4cdc019d01453784113c1e1075752afbcaf46b0cc9585514cf30b42b52b1b1b04fbfc8ed1848195b175ad5a069a1f2bea8902b5c34c6639baf3893597eed8331f3905c1c0d4795ade8a79a1856faea0a17e035d36773144411a9bcd4f64c563f3dfaf6a7e337584a925911924ab2703584943b3a2253c61bd17b58755eadcde655b53e3892c99f24703906b2e94c29266ded9d9f4dfcdfab846774d62d455f97a07f3d55a19a10df9c77669545284c465fcd4a1d2907f2333b734976b66881f84f425f7801ae959a19a77a7a4a9855472ca67b9e208a2a039f7abf323cc0e4277223e99933eec77da48b7a213497a809cac807a0ece32123fe7d425111ef7ece585ffe3d11843597413995c28cd76c11ce99a2a3c46f8fc7fa2d88558e435035e75fc7fe82e846c11b4fb573d13793ef49e755697c78de4bffba7dc4c57ebf96a974dbbb3d9ee7d488da6a1398a395f47626df58221034bbc902f5acc875708943100f9b51081888c8d1fbf2e80951d347228a0d5f352b0fb0e41c59f57efdae26c7b53e57a39eb734a2c02634fb7938f83022d02c4456ccce7e97cb7284c4abc57b1cec9e84b48188c39f8014563e173354043a026af8317a5af30129c620341717d8d2eb9ddb823a8df2180c3f48405e84a966e8dd907d5635d31dcc4a0ba4494d6decb631ac7987a6db14013bef198b1593c27f194a459f6b0f211794b4673fda0e255ea81e78590ad611f3f5baa3e6b7cb3ee6a4c60b121692998700d8ca5efef1fac6f5f3efa573d7954e742bd4d6a9977b77f4d3af28b4c01214085d1dd4fcb010af8ed80534843bdefbc10239245929234322561cbce057f61b14aee1d078c3e09e599446f8e7126b21f2703b7daf1dd9f3a71de7b97dfd4da399baa0921010a35579914369858485fae83da53e5224e905ba3e4df0c7fc3f14b72d6cc8554c3017c2f23f746897edc65c8edc8cfb4e8460b3c9c62b459896cd6b967c112afbe8725bb48b8a8bec3db49afba5c95252fa25b2b9adfe930250c5da259ef59dbc3b2f870201b65ce7bd69f6717891e6edbbe895dc30e1fc7d095960d28f99c86a355d8ff8e6bd0601544a63db13358af8372c51db59eca2808c7a75ed0ae54630ccec7c3ee0b38c90dd31dc480571d99c1185f0f9926964a51455329c9df8c042cb693e72773aa2d5f5a9bc1227e6db9c9cf3d0b1d68376d54dcd798f5a9823973ba879b9985551a2e3cd88267c7a721b88502d208f74813da0ae7227589a45ada0c13a6938376ef0cf8436890488e87a8c1b33c590fde74a4a03ba7ee7191a0d6187ed8fc6275adb94e2aaaba493a7ae6e404c7dbb416a155f6337e5d1ed9b96a08c783c92982638809f1e3ede9e9c375b1e9d6a6570a6e5e2bcb148226c7e91a99dc46aed4fbeba364c3e121ece176de9808654d0804e285a412da136f4aed38c3f9d1765f4817c9160987806e49e036da056c17240b0072b1b6b98f22b0d5ce3d507d316e7debb8dcbc2b54c8e8fac18aa7df9951586a95d273d809152dfc55343316a81394579a74f444c27b38b82c2e4b48411e349c4ec8a5e245102f400fb4412490ae15a87c942881c761264627edf6e85ccaee8eb29e3a653847b6c6de27d431dc6034c168b15d946fe0232c0249495e991ecf78104d7e2535d0039f8291af339f91538c5460b05f3a340433d5184de094ba77e50f7a9918b7c1c57884cc8d59276a353d53651d47263800a758a48a960f50f9573dc1a5abfd1eeaf3f8cd5afe0d4ebf52ce0cafa57877491689664dc115ab54bfdcfee7aabdb741b4785ab72c5c839173cefb7cf092e3243333340096342ab8c174afdf6148a31df8776c854e24bfe2deebcc5171061457d0782968fb5d1a9e92f8067f161aae94bcadca0ac7fb0f1fd44125399b51278409aaee81f614c7db64fd20722d4e5ef1ec1e051dc9a4117e49e0f50657259dbfa2c2d4c206c36ad62e6013f309202bc42314efa1e4f38583fc51d062cabc45e187df2d276d6862aa8606bbeb1773ebe45fd2a63070d2434c2ec2bc0e90a39399dd5ecfacbcabd6feb8593bf9b608cc7d87fe6ca3d765e9d49621d7fcf0e06ef37dfd97ae96406f7e1f483a8792d0da82eaa36c5b1e297640064f812a35e48ba683b5bc09a40debb363f309a49e171a182f3f083f4a339b490e0e0799a1e3e83228a88d1292e06324f779f269da1f6cac8e4c0ac7c9cfc68e40cb7683cd4b326683ba51433ba52f2e410aa6d0e397ce0d627a546007c049064207cbf7a0f2fc257344b63f47dfffe1a588540f5d0aac14bccda4bff8555cdfa47af6b8029b884f38c6136124fdbf21f0fba7ae8589e6637dd02352036531568efb2c4f47c2091695bdbccf4b365bf029ded5a87befea3236bc0233df70fcba350b0b00ad82bca4107e2dee718f06ef9af768ae53b0c2e3a981aff44d6ab17f7b4c81bdc1172f129565e5550092547897346c4d25489725c1a5c1c97af67520d6c095def772f3f68533fccaf43cf8ee6043cda66015f81b392554ffa935517817c4a368eec22b5dfd377ce8c404ab80587897105163b960c6f525d639fd25a0885c873990022013f532d6a0c72ab91dcc02611270dc36266f51055f407a6471fc4dba5c595ae0e486d8b81575a32508e330ff66b55844a0adce0be28bcb7173a090f55492402eef47e0ce3af4231e1e44445a67f0a5a980b6955b6185e4e09e0dbd5d18b4a9d1b6eba7491eaf2e03d44e957a4259f666c5c46fb874ba4a5620415f1861099363e3ed153e0848974c51a7657d384f0c84a8b2159be792930d50d09ffdcfc3e16065a67e43b6b7b840dfef9f4f8aedfceb52277517ca48862650ca679726f97b2a1f04fecd3f21eda10b3792abad42e36743d93b646d9d377917b11c525e4a03afc579f8c2119b702409c153ce6961ab3fa34c59eb445ebdd941a2307597f0c057375e5e93cc26a96b34e8b2e42a0a6a850ab7618df4ca3d7abf6d4d2c9706fc82b9ec2b6ab95d3c3dc864f5f24863637300139f08024900fc2316eaca914aad9a6d592ad09ed2fef068eda30acf740eecbd3b42a897fabab15ee9cac817a3330c3d4b17d88706b5132198b49e30b082b74421300740def82445ec0a9d1b45561bda0a7aaef044aa2bfba8a55e757bb5a820a181d5366da566f0dcae1d7fc3c74bbd7ec586c0e541b50e4c784e8349ba44ee45c9d0571bf90ecfdb0bde875ce713811fe43453009486502fa0100316e3bd60cb1722aca02ea7e60642a359300f8777b1f719e5fc9417040f29baa60f0cf7595719fd1f8c4cffaf5653118f7090cdc50921beebe6b32660760e7d9ad087e628dd20281eb29bda42058e91eb9d0e511a3eb42c7221c32bdb032ae39cad0f07bbdf311b03eeaea4558d185ed11a8eb160478077dc06f49144abadfb2bf5040e51527f011a8bf89f78b574ec9ac19412d1e001e37fc2b3c88d514add48f3d9697b9e406729016b370f7f4310e79b91674e1ce9457cf3f3f10786db7152738a06c998066d2acbb62ddc9cae09f0b59a94e0117fccc9698bb3bb3527061e257d580242ca271cb5d5efc2bba980f32d2b6120858ed87f752fcd5d65555e388db3bcd7f0c868fead56c4c7bf381129967ac79a76092f7b43fc705f4b837ae255b4b8499d5deebc8909e4e7a40ce98e877f62adc7aac0a4c7cd2cdf3e95edff8c6bf2f54a20fbf7721d03f0d80d3577160aa6fb17aa5f4a0c53a701e4b13be4cef4422a45a321b9a9aadadcf755893da05cd481b4a142a68412b875a94b71c08c5a220dca22d4d689d03633851145fbec5c3b6cbff63b27b3f73d883ba99ee70556aeda337df6bdad3d7335ca8de1e44576934596f909b4553f339bf5718b745b0ea17add24eb9e8de02707f2516ccbf01de75fe468953019bc2f0b7fa76d7dff9247c032ba17c7741adaad760d4eb95131aa931a2b513dc1c907788759da4175e46f92609cdfb767a975a9680260938ea98db7529fc8bda8d9527d6d0dad8cdf4eab791c4b3f8d10baed4cfd69034eb9a172270f141ed40e4e08316fe2802338dc6db86797f1ec9dd69d07eb1d2d3ae69ffd02d98e83fc9bf87d3390f8104c5ac36b62024a46ff78a439ad54880a6be4567c04216f991e5dc0bee9f6a20b983a97a62baba1c0def383b20ed8badaf2614a1f3b2f890ecb99b040ac41f2bc2683d285088cd804fdc39e493306cd852bf55670dd8e6fe02870c9187660be1a9ef34d326286b20ce8630984b0b45442a6031c7ee8fb54f0e2931f34c2b5fd7d61c00e7f49def5832128b934d4705c423f02027437d22639da7b4c982be853463292baad38e3714452a8f8c886bb984165d2dd228c8ba609c3bb68a0fc84d954e41d956325cdbfca8473c6a5ef1b670e6317743ebcf8d9149918d4662274037728bc01a3c4f13630c4a9ee00c3daf0d5bd5eaa0cf3374017671c6b23f25d3945aafe9367eddb427d214350c02c7ba211a6b7225de17b31b58afbe8f38530df7a50209c900962002c121842b852f6e0309307ad357dc66c56889c2052f0a4b6aa576e643f696c2b8070d89da128b97779c2212acd9ca2dc2201416aa02de442a254204780c680b01999c35ba60fdbe9ebcafbc7def713d958910b1b8f3dfc3624cef0351a390bc03b8ac2c952b9e3fbe959cdfb6b2f300a1d37186631708e1f434795a0dcb7a5c8d3d717ee7262b9da478bb926004431ed25a991dc94cdf8471c9c747447ffa1774497a3e260a34df19544f1f4e5579e62efd43092d2258678e4fdf56f347177009088b3e371ec2fb2bcd85a66a4bde04264028da156981db5324b91be4c6d8007077f1082148bf4cdccd4548c4aca7d940015fa95ce3d3a293ef0f562ab7a3cbabec635e935f0ee341e33f192c3af2d70d42a50207418358713797f6555ad15c858f46f29284e0dd1f180f75b7718f7e0181c7945d14210c9b3d4859c9cdfd6f9db9ab58b17f4b5eeae96baac4bb22629ce676a72459cb1d772265291f37aa8d4a85c14bd2a57e8d72896191f7049b21a8bc54b137594bc90226d3c4303e8074507e0d551a9483e033b489e068e6b1795f144a03054d310d4793ad8fb9886f63ec598b3168d59223aed1fb8e36d3354a259d7b6d8b52690bb635553714ec44d1194188d75774281c8b7f70079970697a0eb1bc54c1f6a4f75f54f8307af883f34a50cfb562812305f2b0518c43ac81389cac2d7b17e995559a1ea69b7a2187a381873eca084e9a4388c4665241f94534143d7aaac0bb9f4656cda45a557b4d55e457e0860e45f090b3462137c589cfd2d3f655f832b7577438ce0146f39525b75016b7d39625cf432707af6e37e08019c84c783b91048c4204edf334ab5bdb2423be6ba12d53c7cf26a89c3881fc9e6ff6d347c77adcf0e933e870a4878dc65328b6452fc3c2f0c26524397f9efa6b42956594b758f9d8ae0676b802ecd1f1b312fb4a0464030cd0c9f6502a7f2ac505edfc0a4324"]}]}, 0x1244}, {&(0x7f0000007d40)={0x34ec, 0x31, 0x400, 0x70bd28, 0x25dfdbff, "", [@generic="551d5104d97ed214cdf6b78030a47bec93486f1ae75935bd16564ee36e9902410594cfb9f8950c3ec3f68217ea54864bc9aea9ea3ef5f0f407b6a1c5916bed61b52892681b5a99586a4f3ca07bb1c982b6ca13dc740ea6338074950d32f5ef", @nested={0x11d0, 0x36, 0x0, 0x1, [@typed={0x4, 0x96}, @generic="6e65b9b0c014b669c76232365dd926daab2c052caa0c9a9fe8ce2543061f6f9d32e967c9c072e3b0ac3806be9ff293525823fe3cc6d94b5bb90f01425e2715170bc8d5f04aa343e5ce8bffae7d034d9b6a08fc40bd4536a357c39871217dbd0f338e9a89a36e5d2f2084f22e1f706129b70f8aae48dce8a3d60a7ed12ecc51cde839f458830169e4f2944e741644496a7b3d64b2e0e280724089d1", @typed={0x1004, 0x87, 0x0, 0x0, @binary="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"}, @typed={0x4, 0x88}, @generic="4eaa1215eef4374849047ba1db07590d49cc7b7bcbe12cd0418a8e91a6be403080be9ea69f6f2a951a52294f1d8235ea63b738ca7de188537b80647b173d1e27045a69dc192dfc52d7ddc6decab0bbe4200912762ae6677c21a330c80c5fa60a380f4bb974e88167cd327bf7fe390179d2c804649ae76ff535a08c15168811f9468cae9afdc9d3037f967319b4ecfe0916827a22e8a23ebb9c52dd3bfe47ccdedc103fd8e3142caa567615cc765076a3b67b898045b17c87694ed3c574d911d2fe51def40ec670ccb3", @typed={0x50, 0x5, 0x0, 0x0, @binary="ac22934958f7a1a55da0ff3140cdcd62c46e5842aebbeee58bb93a6367b05e73b1498d827c0683a552d8f70bbc80eaed6901d0dda37293c695103d42835635ab328572946089e29791552a60"}, @typed={0xc, 0x4c, 0x0, 0x0, @u64=0x2ecc0000}]}, @typed={0x4, 0x7d}, @typed={0x14, 0x1e, 0x0, 0x0, @ipv6=@private1}, @nested={0x10f4, 0x5b, 0x0, 0x1, [@typed={0xe2, 0x34, 0x0, 0x0, @binary="014cd3ee4511d6970abb62d5615cd321524ad52f59fc3276557bab617beac6217384b0de44b33bccefa523f74a0666b31ce431329a687bf49cf0f9045e1dfb736f383210a7763ea88323a737791997dceb4802b9932feb6f76df96154029ec67e499d939865190a30284fff00e7c5a6245d64cf4e2746f3133c30847a420c2bec1b76d3fd888a9426b000dd8741a293637f77213173dd306504862ffa6bd351388b6f4759869563da9f92a5339a057ddbbc81a6aa57f09b797e8509e106350fd97a7ec8ff25fe88b38bb0cecb0f60b8bb718ee079d61eb54a3a40f01b879"}, @typed={0xc, 0x18, 0x0, 0x0, @u64=0x3ff}, @generic="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"]}, @generic="86e4872c404ddf513382a92ed55c887664b7939cddd814", @nested={0x105c, 0x6c, 0x0, 0x1, [@generic="749096153e1397e86f2f868767c0113437b3dc", @generic="676ddbf02b85dbece284de7e75fc10adc94f7eee62c1485f85b439839e5a4be794d7b7e7ee9bf2fc873676255df5e7d0dd946b36d4d1a8367942dd7192", @typed={0x8, 0x72, 0x0, 0x0, @ipv4=@local}, @generic="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"]}, @nested={0x11d, 0x5e, 0x0, 0x1, [@typed={0x4, 0xe, 0x0, 0x0, @binary}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@loopback}, @generic="0fb3442c76be199a0766be9f06f25890f644c125dca5076088ad7240bdf60ea68b47e3373a3f593d138089d1cb4fd74616965363f290d12f8564c905a3afdeffc2c5d92aa6ddef3cc964a34f5018586e964886440d37ba02850a0ac0e24065a69d2ca1ef849877e5031fdf92b434584c86", @typed={0x8, 0x57, 0x0, 0x0, @u32=0x9}, @typed={0xc, 0x50, 0x0, 0x0, @u64}, @typed={0x7d, 0x49, 0x0, 0x0, @binary="4a05d8a9a85b6acb9659b89315ae1f84f6e58f6164bf5eb4210d2295251ff235521e6a3579a304d75a6efa119d1cd3eb3ac8424d18bb7750416f14a280ba80e5c0c8d4859a069bc715640d9ab44d28f61264e2b211ef67575ca8877790566a6fca3cc7f64142735bab58c9053ca966d2a65e1ff8bcbf028019"}, @typed={0x8, 0x34, 0x0, 0x0, @ipv4=@remote}]}, @typed={0xc, 0x20, 0x0, 0x0, @u64=0x80000001}]}, 0x34ec}, {&(0x7f0000000440)={0x84, 0x1b, 0x4, 0x70bd29, 0x25dfdbfe, "", [@typed={0x4, 0x41}, @generic="32e735ae5fee0a648008079d665b80b6b03745a6b5aa2bfd8762a7fe915713710b925c316cd577a3637b0abfb6b084eb2d9e4893d21531101f613a5f8d53a314d600311852e30b58026cbcbd48a1c11e68650a2d1c5c381b4539f0ff", @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x84}, {&(0x7f0000000500)={0x1c, 0x36, 0x300, 0x70bd28, 0x25dfdbfe, "", [@typed={0xc, 0x55, 0x0, 0x0, @u64=0x6}]}, 0x1c}, {&(0x7f0000000540)={0xd0, 0x28, 0x800, 0x70bd25, 0x25dfdbfd, "", [@generic="f4904557e493831d8b", @nested={0x94, 0x60, 0x0, 0x1, [@typed={0x8f, 0x34, 0x0, 0x0, @binary="0c0fc83adf3df7d1273ad46f0cae9c1a8edb83861edd16fa4b18b527a61f8b54393e865c13f1625b21ac9f85a867c02d6bd9727d9196294abdbd1c87273727d08df64ddcf9199dbbcfb6e70bc896fbc34f0a54220b977c54929f456f6205019d439c359019162369ca22e7456a4e36e47a7c9e5eb94268a4d0e86fdb9cda55f677b4ebf2e959829828f2b9"}]}, @typed={0x8, 0x9, 0x0, 0x0, @pid=r8}, @generic="4af4627d5928821e06cc3a8d8f137c8036dc2ce1c99c95dfbcc2"]}, 0xd0}, {&(0x7f0000000680)={0x180, 0x3c, 0x100, 0x70bd27, 0x25dfdbfd, "", [@nested={0xa8, 0x4d, 0x0, 0x1, [@typed={0x8, 0x30, 0x0, 0x0, @fd=r9}, @generic="4278add34045215d30c07423efa1fe51da21aaa02862c135e7054fd484f5de433742cf28ec2f50e2d61634211472f15fb34c6965277326666dce8f297fa90ac4653723e406c247c9f9025388c5f4c5e7ae2e5bed0216cf306f7fa1580e49a2ab69cbaf2afd4cc4a6e8add786d5371d91052dbc5ba19d145709facff14ae16961", @generic="b9dbdee1d7f6c974b81ba886b0cc9ca8af73d43f895b0a77c9a5efb2"]}, @generic="616581858bc289832f5131e4e6410a483d02b8da19adc162dd55d7d79911f4a4d0a3f5076ce91fb581877307051420ec71bd79e6344d70760d89fc2c3360c50ed6f751ce4d2246733f5c98cee81a9df3c6b6e755a8eb5da6b35583f092548f1f4589fd0a0573e836cc99ec55211c9a432aa82ecaf85c735a1a5bc045a4a612aa1df3078ccc98d3f20fff18f43915d8f84a2f417fa8af66f8ea787c6bc315a345646af78da8a3fe352d45245240baa902e4d84214", @typed={0xc, 0x89, 0x0, 0x0, @u64=0xffffffffffffffff}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x6}]}, 0x180}], 0x7, &(0x7f0000015380)=[@rights={{0x1c, 0x1, 0x1, [r10, r11, r5, r12]}}, @rights={{0x20, 0x1, 0x1, [r13, r14, r0, r0, r15]}}, @cred={{0x18, 0x1, 0x2, {r2, r16, r6}}}, @rights={{0x14, 0x1, 0x1, [r0, r5]}}, @rights={{0x1c, 0x1, 0x1, [r17, r18, r19, r0]}}, @cred={{0x18, 0x1, 0x2, {r20, r21, r22}}}, @cred={{0x18, 0x1, 0x2, {r23, r3, r24}}}], 0xb4, 0x4000001}, 0x4000012) 03:30:00 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 23) 03:30:00 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 433.778603][ T9557] FAULT_INJECTION: forcing a failure. 03:30:00 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 433.778603][ T9557] name failslab, interval 1, probability 0, space 0, times 0 [ 433.784621][ T9557] CPU: 2 PID: 9557 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 433.789402][ T9557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 433.794017][ T9557] Call Trace: [ 433.795590][ T9557] [ 433.796865][ T9557] dump_stack_lvl+0x125/0x1b0 [ 433.798625][ T9557] should_fail_ex+0x496/0x5b0 [ 433.800370][ T9557] should_failslab+0x9/0x20 [ 433.802030][ T9557] __kmem_cache_alloc_node+0x2f7/0x340 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 433.804021][ T9557] ? alloc_workqueue+0x16f/0x1490 03:30:00 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 433.806133][ T9557] ? kvm_dev_ioctl+0x9b6/0x1c20 [ 433.808406][ T9557] ? do_fast_syscall_32+0x33/0x70 [ 433.810245][ T9557] kmalloc_trace+0x25/0xe0 [ 433.811882][ T9557] alloc_workqueue+0x16f/0x1490 [ 433.813686][ T9557] ? workqueue_sysfs_register+0x400/0x400 [ 433.815765][ T9557] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 433.817667][ T9557] kvm_mmu_init_vm+0x248/0x2e0 [ 433.819432][ T9557] kvm_arch_init_vm+0x39/0x720 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 433.821209][ T9557] ? __kasan_kmalloc+0xa2/0xb0 [ 433.823058][ T9557] kvm_dev_ioctl+0xa31/0x1c20 [ 433.824799][ T9557] ? bit_wait_io_timeout+0x160/0x160 [ 433.826732][ T9557] ? __fget_files+0x272/0x410 [ 433.828458][ T9557] ? kvm_vcpu_stats_release+0x80/0x80 [ 433.830425][ T9557] ? __fget_files+0x272/0x410 [ 433.832151][ T9557] ? bpf_lsm_file_ioctl+0x9/0x10 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x1b24) [ 433.833963][ T9557] ? kvm_vcpu_stats_release+0x80/0x80 [ 433.836044][ T9557] __do_compat_sys_ioctl+0x2bf/0x330 [ 433.837972][ T9557] __do_fast_syscall_32+0x61/0xe0 [ 433.839809][ T9557] do_fast_syscall_32+0x33/0x70 [ 433.841593][ T9557] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 433.843895][ T9557] RIP: 0023:0xf7f82579 [ 433.845402][ T9557] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 433.852835][ T9557] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 433.855871][ T9557] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 433.858755][ T9557] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 433.861640][ T9557] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 433.864515][ T9557] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 433.867389][ T9557] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 433.870286][ T9557] 03:30:00 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) ioctl$HIDIOCGRAWPHYS(r0, 0x80404805, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, 0x0, 0x10) 03:30:00 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 24) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async, rerun: 64) write$FUSE_IOCTL(r1, 0x0, 0x0) (async, rerun: 64) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x1b24) (rerun: 32) 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x708, 0x7, 0x7, 0x4, {{0x2b, 0x4, 0x3, 0x9, 0xac, 0x64, 0x0, 0x4, 0x29, 0x0, @remote, @broadcast, {[@rr={0x7, 0x1f, 0xb8, [@empty, @multicast1, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0x72, 0x3, 0x9, [{@multicast1, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x5}, {@private=0xa010101, 0x6}, {@remote, 0x9}]}, @timestamp_addr={0x44, 0x2c, 0xef, 0x1, 0xf, [{@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast1, 0x7d0e}, {@broadcast, 0x4000000}, {@multicast1, 0xfffff1c3}]}, @noop, @lsrr={0x83, 0xb, 0x6, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @end, @timestamp={0x44, 0x14, 0xab, 0x0, 0x0, [0x800000, 0x1, 0x0, 0x9]}, @lsrr={0x83, 0x7, 0x46, [@empty]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7, 0x5fcd8364, 0x7, 0x400, r0, 0x10001, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x3, 0x1}, 0x48) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x1b24) openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x1b24) (async) [ 433.898334][ T9584] FAULT_INJECTION: forcing a failure. [ 433.898334][ T9584] name failslab, interval 1, probability 0, space 0, times 0 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 433.903590][ T9584] CPU: 2 PID: 9584 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x708, 0x7, 0x7, 0x4, {{0x2b, 0x4, 0x3, 0x9, 0xac, 0x64, 0x0, 0x4, 0x29, 0x0, @remote, @broadcast, {[@rr={0x7, 0x1f, 0xb8, [@empty, @multicast1, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0x72, 0x3, 0x9, [{@multicast1, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x5}, {@private=0xa010101, 0x6}, {@remote, 0x9}]}, @timestamp_addr={0x44, 0x2c, 0xef, 0x1, 0xf, [{@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast1, 0x7d0e}, {@broadcast, 0x4000000}, {@multicast1, 0xfffff1c3}]}, @noop, @lsrr={0x83, 0xb, 0x6, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @end, @timestamp={0x44, 0x14, 0xab, 0x0, 0x0, [0x800000, 0x1, 0x0, 0x9]}, @lsrr={0x83, 0x7, 0x46, [@empty]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7, 0x5fcd8364, 0x7, 0x400, r0, 0x10001, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x708, 0x7, 0x7, 0x4, {{0x2b, 0x4, 0x3, 0x9, 0xac, 0x64, 0x0, 0x4, 0x29, 0x0, @remote, @broadcast, {[@rr={0x7, 0x1f, 0xb8, [@empty, @multicast1, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0x72, 0x3, 0x9, [{@multicast1, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x5}, {@private=0xa010101, 0x6}, {@remote, 0x9}]}, @timestamp_addr={0x44, 0x2c, 0xef, 0x1, 0xf, [{@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast1, 0x7d0e}, {@broadcast, 0x4000000}, {@multicast1, 0xfffff1c3}]}, @noop, @lsrr={0x83, 0xb, 0x6, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @end, @timestamp={0x44, 0x14, 0xab, 0x0, 0x0, [0x800000, 0x1, 0x0, 0x9]}, @lsrr={0x83, 0x7, 0x46, [@empty]}]}}}}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7, 0x5fcd8364, 0x7, 0x400, r0, 0x10001, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x3, 0x1}, 0x48) (async) [ 433.907378][ T9584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 433.911211][ T9584] Call Trace: [ 433.912459][ T9584] [ 433.913552][ T9584] dump_stack_lvl+0x125/0x1b0 [ 433.915283][ T9584] should_fail_ex+0x496/0x5b0 [ 433.917028][ T9584] should_failslab+0x9/0x20 [ 433.918701][ T9584] __kmem_cache_alloc_node+0x2f7/0x340 [ 433.920711][ T9584] ? alloc_workqueue+0x16f/0x1490 [ 433.922574][ T9584] ? kvm_dev_ioctl+0x9b6/0x1c20 [ 433.924386][ T9584] ? do_fast_syscall_32+0x33/0x70 [ 433.926249][ T9584] kmalloc_trace+0x25/0xe0 [ 433.927911][ T9584] alloc_workqueue+0x16f/0x1490 [ 433.929729][ T9584] ? workqueue_sysfs_register+0x400/0x400 [ 433.931839][ T9584] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 433.933735][ T9584] kvm_mmu_init_vm+0x248/0x2e0 [ 433.935505][ T9584] kvm_arch_init_vm+0x39/0x720 [ 433.937302][ T9584] ? __kasan_kmalloc+0xa2/0xb0 [ 433.939070][ T9584] kvm_dev_ioctl+0xa31/0x1c20 [ 433.940831][ T9584] ? bit_wait_io_timeout+0x160/0x160 [ 433.942776][ T9584] ? __fget_files+0x272/0x410 [ 433.944512][ T9584] ? kvm_vcpu_stats_release+0x80/0x80 [ 433.946484][ T9584] ? __fget_files+0x272/0x410 [ 433.948223][ T9584] ? bpf_lsm_file_ioctl+0x9/0x10 [ 433.950050][ T9584] ? kvm_vcpu_stats_release+0x80/0x80 [ 433.952028][ T9584] __do_compat_sys_ioctl+0x2bf/0x330 [ 433.953971][ T9584] __do_fast_syscall_32+0x61/0xe0 [ 433.955831][ T9584] do_fast_syscall_32+0x33/0x70 [ 433.957631][ T9584] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 433.959991][ T9584] RIP: 0023:0xf7f82579 [ 433.961499][ T9584] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 433.968529][ T9584] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 433.971576][ T9584] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 433.974488][ T9584] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 433.977404][ T9584] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 433.980309][ T9584] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 433.983188][ T9584] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 433.986099][ T9584] 03:30:00 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 25) 03:30:00 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x708, 0x7, 0x7, 0x4, {{0x2b, 0x4, 0x3, 0x9, 0xac, 0x64, 0x0, 0x4, 0x29, 0x0, @remote, @broadcast, {[@rr={0x7, 0x1f, 0xb8, [@empty, @multicast1, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0x72, 0x3, 0x9, [{@multicast1, 0x7}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x5}, {@private=0xa010101, 0x6}, {@remote, 0x9}]}, @timestamp_addr={0x44, 0x2c, 0xef, 0x1, 0xf, [{@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast1, 0x7d0e}, {@broadcast, 0x4000000}, {@multicast1, 0xfffff1c3}]}, @noop, @lsrr={0x83, 0xb, 0x6, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @end, @timestamp={0x44, 0x14, 0xab, 0x0, 0x0, [0x800000, 0x1, 0x0, 0x9]}, @lsrr={0x83, 0x7, 0x46, [@empty]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7, 0x5fcd8364, 0x7, 0x400, r0, 0x10001, '\x00', r1, 0xffffffffffffffff, 0x0, 0x2, 0x3, 0x1}, 0x48) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:00 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) 03:30:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) [ 434.024932][ T9602] FAULT_INJECTION: forcing a failure. [ 434.024932][ T9602] name failslab, interval 1, probability 0, space 0, times 0 03:30:00 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) [ 434.033324][ T9602] CPU: 3 PID: 9602 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 434.038232][ T9602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 434.042941][ T9602] Call Trace: [ 434.044534][ T9602] [ 434.045939][ T9602] dump_stack_lvl+0x125/0x1b0 [ 434.048198][ T9602] should_fail_ex+0x496/0x5b0 [ 434.050155][ T9602] should_failslab+0x9/0x20 [ 434.051972][ T9602] __kmem_cache_alloc_node+0x2f7/0x340 [ 434.054184][ T9602] ? kasprintf+0xc8/0x100 [ 434.056256][ T9602] ? kasprintf+0xc8/0x100 [ 434.058064][ T9602] __kmalloc_node_track_caller+0x50/0x100 [ 434.060563][ T9602] kvasprintf+0xbd/0x150 [ 434.062162][ T9602] ? bust_spinlocks+0xe0/0xe0 [ 434.064137][ T9602] ? fill_ptr_key+0x30/0x30 [ 434.065797][ T9602] ? preempt_count_add+0x72/0x140 [ 434.067648][ T9602] kasprintf+0xc8/0x100 [ 434.069238][ T9602] ? kvasprintf_const+0x190/0x190 [ 434.071204][ T9602] ? free_zapped_rcu+0x290/0x290 [ 434.073150][ T9602] ? lockdep_init_map_type+0x16d/0x7c0 [ 434.075238][ T9602] alloc_workqueue+0x590/0x1490 [ 434.077091][ T9602] ? workqueue_sysfs_register+0x400/0x400 [ 434.079241][ T9602] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 434.081188][ T9602] kvm_mmu_init_vm+0x248/0x2e0 [ 434.082991][ T9602] kvm_arch_init_vm+0x39/0x720 [ 434.085082][ T9602] ? __kasan_kmalloc+0xa2/0xb0 [ 434.087362][ T9602] kvm_dev_ioctl+0xa31/0x1c20 [ 434.089597][ T9602] ? bit_wait_io_timeout+0x160/0x160 [ 434.092037][ T9602] ? __fget_files+0x272/0x410 [ 434.094276][ T9602] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.096685][ T9602] ? __fget_files+0x272/0x410 [ 434.098665][ T9602] ? bpf_lsm_file_ioctl+0x9/0x10 [ 434.100945][ T9602] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.103407][ T9602] __do_compat_sys_ioctl+0x2bf/0x330 [ 434.105902][ T9602] __do_fast_syscall_32+0x61/0xe0 [ 434.108291][ T9602] do_fast_syscall_32+0x33/0x70 [ 434.110596][ T9602] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 434.113570][ T9602] RIP: 0023:0xf7f82579 [ 434.115497][ T9602] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 434.123778][ T9602] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 434.127493][ T9602] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 434.130740][ T9602] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 434.134353][ T9602] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 434.137324][ T9602] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 434.140570][ T9602] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 434.143438][ T9602] 03:30:01 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 26) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) (async) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) [ 434.252552][ T9621] FAULT_INJECTION: forcing a failure. 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) (async) [ 434.252552][ T9621] name failslab, interval 1, probability 0, space 0, times 0 [ 434.257754][ T9621] CPU: 2 PID: 9621 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 434.262087][ T9621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 434.265691][ T9621] Call Trace: [ 434.266933][ T9621] [ 434.268011][ T9621] dump_stack_lvl+0x125/0x1b0 [ 434.269708][ T9621] should_fail_ex+0x496/0x5b0 [ 434.271825][ T9621] should_failslab+0x9/0x20 [ 434.273575][ T9621] __kmem_cache_alloc_node+0x2f7/0x340 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 434.275536][ T9621] ? kasprintf+0xc8/0x100 [ 434.277631][ T9621] ? kasprintf+0xc8/0x100 03:30:01 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) r1 = openat$full(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5, 0x6, 0x7fff, 0x0, r0, 0x4, '\x00', 0x0, r1, 0x3, 0x1, 0x5, 0x1}, 0x48) [ 434.279675][ T9621] __kmalloc_node_track_caller+0x50/0x100 [ 434.282004][ T9621] kvasprintf+0xbd/0x150 [ 434.283538][ T9621] ? bust_spinlocks+0xe0/0xe0 [ 434.285257][ T9621] ? fill_ptr_key+0x30/0x30 [ 434.286916][ T9621] ? preempt_count_add+0x72/0x140 [ 434.288747][ T9621] kasprintf+0xc8/0x100 [ 434.290247][ T9621] ? kvasprintf_const+0x190/0x190 [ 434.292071][ T9621] ? free_zapped_rcu+0x290/0x290 [ 434.293859][ T9621] ? lockdep_init_map_type+0x16d/0x7c0 [ 434.295848][ T9621] alloc_workqueue+0x590/0x1490 [ 434.298160][ T9621] ? workqueue_sysfs_register+0x400/0x400 [ 434.300843][ T9621] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 434.303214][ T9621] kvm_mmu_init_vm+0x248/0x2e0 [ 434.305450][ T9621] kvm_arch_init_vm+0x39/0x720 [ 434.307663][ T9621] ? __kasan_kmalloc+0xa2/0xb0 [ 434.309924][ T9621] kvm_dev_ioctl+0xa31/0x1c20 [ 434.312157][ T9621] ? bit_wait_io_timeout+0x160/0x160 [ 434.314625][ T9621] ? __fget_files+0x272/0x410 [ 434.316784][ T9621] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.319307][ T9621] ? __fget_files+0x272/0x410 [ 434.321336][ T9621] ? bpf_lsm_file_ioctl+0x9/0x10 [ 434.323617][ T9621] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.326112][ T9621] __do_compat_sys_ioctl+0x2bf/0x330 [ 434.328588][ T9621] __do_fast_syscall_32+0x61/0xe0 [ 434.330858][ T9621] do_fast_syscall_32+0x33/0x70 [ 434.332868][ T9621] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 434.335211][ T9621] RIP: 0023:0xf7f82579 [ 434.336776][ T9621] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 434.343981][ T9621] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 434.347479][ T9621] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 434.350556][ T9621] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 434.353407][ T9621] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 434.356401][ T9621] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 434.360003][ T9621] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 434.363111][ T9621] 03:30:01 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) (async, rerun: 64) r1 = openat$full(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5, 0x6, 0x7fff, 0x0, r0, 0x4, '\x00', 0x0, r1, 0x3, 0x1, 0x5, 0x1}, 0x48) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 27) 03:30:01 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000000)={0x6, 0x8}) read$FUSE(r0, &(0x7f0000002a40)={0x2020}, 0x1e19) [ 434.897901][ T9639] FAULT_INJECTION: forcing a failure. [ 434.897901][ T9639] name failslab, interval 1, probability 0, space 0, times 0 [ 434.903079][ T9639] CPU: 1 PID: 9639 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000000)={0x6, 0x8}) read$FUSE(r0, &(0x7f0000002a40)={0x2020}, 0x1e19) openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r1, 0x0, 0x0) (async) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000000)={0x6, 0x8}) (async) read$FUSE(r0, &(0x7f0000002a40)={0x2020}, 0x1e19) (async) [ 434.906963][ T9639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 434.910904][ T9639] Call Trace: [ 434.912243][ T9639] [ 434.913361][ T9639] dump_stack_lvl+0x125/0x1b0 [ 434.915152][ T9639] should_fail_ex+0x496/0x5b0 [ 434.916970][ T9639] should_failslab+0x9/0x20 03:30:01 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0x10) openat$full(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) r1 = openat$full(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5, 0x6, 0x7fff, 0x0, r0, 0x4, '\x00', 0x0, r1, 0x3, 0x1, 0x5, 0x1}, 0x48) [ 434.918678][ T9639] __kmem_cache_alloc_node+0x2f7/0x340 [ 434.920900][ T9639] ? apply_wqattrs_prepare+0xff/0xa90 [ 434.922980][ T9639] ? apply_wqattrs_prepare+0xff/0xa90 [ 434.925003][ T9639] __kmalloc+0x4f/0x100 [ 434.926580][ T9639] apply_wqattrs_prepare+0xff/0xa90 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 434.928560][ T9639] apply_workqueue_attrs_locked+0xcb/0x150 [ 434.930832][ T9639] alloc_workqueue+0xdae/0x1490 [ 434.932622][ T9639] ? workqueue_sysfs_register+0x400/0x400 03:30:01 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r1, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000000)={0x6, 0x8}) (async) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000000)={0x6, 0x8}) read$FUSE(r0, &(0x7f0000002a40)={0x2020}, 0x1e19) [ 434.934698][ T9639] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 434.936705][ T9639] kvm_mmu_init_vm+0x248/0x2e0 [ 434.938449][ T9639] kvm_arch_init_vm+0x39/0x720 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) [ 434.940204][ T9639] ? __kasan_kmalloc+0xa2/0xb0 [ 434.942034][ T9639] kvm_dev_ioctl+0xa31/0x1c20 [ 434.943757][ T9639] ? bit_wait_io_timeout+0x160/0x160 [ 434.945684][ T9639] ? __fget_files+0x272/0x410 [ 434.947403][ T9639] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.949355][ T9639] ? __fget_files+0x272/0x410 [ 434.951070][ T9639] ? bpf_lsm_file_ioctl+0x9/0x10 [ 434.952883][ T9639] ? kvm_vcpu_stats_release+0x80/0x80 [ 434.954836][ T9639] __do_compat_sys_ioctl+0x2bf/0x330 [ 434.956785][ T9639] __do_fast_syscall_32+0x61/0xe0 [ 434.958614][ T9639] do_fast_syscall_32+0x33/0x70 [ 434.960398][ T9639] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 434.962693][ T9639] RIP: 0023:0xf7f82579 [ 434.964204][ T9639] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 434.971331][ T9639] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 434.974344][ T9639] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 434.977311][ T9639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 434.980221][ T9639] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 434.983090][ T9639] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 434.985956][ T9639] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 434.988818][ T9639] 03:30:01 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 28) 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 03:30:01 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x3, 0x2, 0x60000000000000, 0x0, 0x400, 0x2, {0x1, 0x4, 0x6, 0xfe, 0x3, 0x2, 0x6ee, 0x0, 0x8, 0x8000, 0x7, r2, 0x0, 0x7ff, 0x10001}}, {0x0, 0x2}}}, 0xa0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000026c0)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4800) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x69c47ca2e65177e) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x14) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, r7, 0x231c7000) r8 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r8, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r8, 0x0, 0x0) write$FUSE_ENTRY(r8, &(0x7f0000000040)={0x90, 0xffffffffffffffda, r1, {0x0, 0x3, 0x400, 0xfffffffffffffffb, 0x2, 0x8, {0x2, 0x6, 0x1, 0x9, 0x0, 0x2, 0xebb, 0x1ff, 0x5, 0x6000, 0x8, r2, r3, 0x0, 0xebba}}}, 0x90) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x0, 0x25dfdbfd, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x330, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x330}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 435.018118][ T9666] FAULT_INJECTION: forcing a failure. [ 435.018118][ T9666] name failslab, interval 1, probability 0, space 0, times 0 [ 435.022834][ T9666] CPU: 1 PID: 9666 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:30:01 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x3, 0x2, 0x60000000000000, 0x0, 0x400, 0x2, {0x1, 0x4, 0x6, 0xfe, 0x3, 0x2, 0x6ee, 0x0, 0x8, 0x8000, 0x7, r2, 0x0, 0x7ff, 0x10001}}, {0x0, 0x2}}}, 0xa0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000026c0)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4800) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x69c47ca2e65177e) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x14) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, r7, 0x231c7000) r8 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r8, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r8, 0x0, 0x0) write$FUSE_ENTRY(r8, &(0x7f0000000040)={0x90, 0xffffffffffffffda, r1, {0x0, 0x3, 0x400, 0xfffffffffffffffb, 0x2, 0x8, {0x2, 0x6, 0x1, 0x9, 0x0, 0x2, 0xebb, 0x1ff, 0x5, 0x6000, 0x8, r2, r3, 0x0, 0xebba}}}, 0x90) openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x3, 0x2, 0x60000000000000, 0x0, 0x400, 0x2, {0x1, 0x4, 0x6, 0xfe, 0x3, 0x2, 0x6ee, 0x0, 0x8, 0x8000, 0x7, r2, 0x0, 0x7ff, 0x10001}}, {0x0, 0x2}}}, 0xa0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000026c0)={0x14}, 0x14}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00'}) (async) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4800) (async) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x69c47ca2e65177e) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x14) (async) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, r7, 0x231c7000) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r8, &(0x7f0000002a40)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r8, 0x0, 0x0) (async) write$FUSE_ENTRY(r8, &(0x7f0000000040)={0x90, 0xffffffffffffffda, r1, {0x0, 0x3, 0x400, 0xfffffffffffffffb, 0x2, 0x8, {0x2, 0x6, 0x1, 0x9, 0x0, 0x2, 0xebb, 0x1ff, 0x5, 0x6000, 0x8, r2, r3, 0x0, 0xebba}}}, 0x90) (async) [ 435.026613][ T9666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 435.030509][ T9666] Call Trace: [ 435.031742][ T9666] [ 435.032842][ T9666] dump_stack_lvl+0x125/0x1b0 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x6, 0x7, 0x20, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7840, 0x8000, 0xf8e, 0x7}}) [ 435.034580][ T9666] should_fail_ex+0x496/0x5b0 [ 435.036638][ T9666] should_failslab+0x9/0x20 [ 435.038810][ T9666] __kmem_cache_alloc_node+0x2f7/0x340 [ 435.041253][ T9666] ? apply_wqattrs_prepare+0x137/0xa90 [ 435.043227][ T9666] kmalloc_trace+0x25/0xe0 [ 435.044860][ T9666] apply_wqattrs_prepare+0x137/0xa90 [ 435.046813][ T9666] apply_workqueue_attrs_locked+0xcb/0x150 [ 435.048935][ T9666] alloc_workqueue+0xdae/0x1490 [ 435.050715][ T9666] ? workqueue_sysfs_register+0x400/0x400 [ 435.052780][ T9666] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 435.054635][ T9666] kvm_mmu_init_vm+0x248/0x2e0 [ 435.056597][ T9666] kvm_arch_init_vm+0x39/0x720 [ 435.058884][ T9666] ? __kasan_kmalloc+0xa2/0xb0 [ 435.061028][ T9666] kvm_dev_ioctl+0xa31/0x1c20 [ 435.062752][ T9666] ? bit_wait_io_timeout+0x160/0x160 [ 435.064695][ T9666] ? __fget_files+0x272/0x410 [ 435.066415][ T9666] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.068371][ T9666] ? __fget_files+0x272/0x410 [ 435.070101][ T9666] ? bpf_lsm_file_ioctl+0x9/0x10 [ 435.071910][ T9666] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.073900][ T9666] __do_compat_sys_ioctl+0x2bf/0x330 [ 435.075851][ T9666] __do_fast_syscall_32+0x61/0xe0 [ 435.078249][ T9666] do_fast_syscall_32+0x33/0x70 [ 435.080589][ T9666] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 435.082925][ T9666] RIP: 0023:0xf7f82579 [ 435.084419][ T9666] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 435.091612][ T9666] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 435.094615][ T9666] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 435.097988][ T9666] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 435.101453][ T9666] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 435.104307][ T9666] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 435.107178][ T9666] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.110051][ T9666] 03:30:01 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x3, 0x2, 0x60000000000000, 0x0, 0x400, 0x2, {0x1, 0x4, 0x6, 0xfe, 0x3, 0x2, 0x6ee, 0x0, 0x8, 0x8000, 0x7, r2, 0x0, 0x7ff, 0x10001}}, {0x0, 0x2}}}, 0xa0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000026c0)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4800) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x69c47ca2e65177e) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x14) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, r7, 0x231c7000) r8 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r8, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r8, 0x0, 0x0) write$FUSE_ENTRY(r8, &(0x7f0000000040)={0x90, 0xffffffffffffffda, r1, {0x0, 0x3, 0x400, 0xfffffffffffffffb, 0x2, 0x8, {0x2, 0x6, 0x1, 0x9, 0x0, 0x2, 0xebb, 0x1ff, 0x5, 0x6000, 0x8, r2, r3, 0x0, 0xebba}}}, 0x90) openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000140)={0xa0, 0x0, r1, {{0x3, 0x2, 0x60000000000000, 0x0, 0x400, 0x2, {0x1, 0x4, 0x6, 0xfe, 0x3, 0x2, 0x6ee, 0x0, 0x8, 0x8000, 0x7, r2, 0x0, 0x7ff, 0x10001}}, {0x0, 0x2}}}, 0xa0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000026c0)={0x14}, 0x14}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00'}) (async) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r4, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4800) (async) read$FUSE(r0, &(0x7f0000004a80)={0x2020}, 0x69c47ca2e65177e) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x14) (async) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, r7, 0x231c7000) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r8, &(0x7f0000002a40)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r8, 0x0, 0x0) (async) write$FUSE_ENTRY(r8, &(0x7f0000000040)={0x90, 0xffffffffffffffda, r1, {0x0, 0x3, 0x400, 0xfffffffffffffffb, 0x2, 0x8, {0x2, 0x6, 0x1, 0x9, 0x0, 0x2, 0xebb, 0x1ff, 0x5, 0x6000, 0x8, r2, r3, 0x0, 0xebba}}}, 0x90) (async) 03:30:01 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x6, 0x7, 0x20, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7840, 0x8000, 0xf8e, 0x7}}) (rerun: 32) 03:30:01 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 29) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x234, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x234}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) 03:30:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x1b4, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 435.140672][ T9693] FAULT_INJECTION: forcing a failure. [ 435.140672][ T9693] name failslab, interval 1, probability 0, space 0, times 0 03:30:02 executing program 0: bpf$MAP_CREATE(0x2, 0x0, 0x10) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x6, 0x7, 0x20, @dev={0xfe, 0x80, '\x00', 0x2b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7840, 0x8000, 0xf8e, 0x7}}) (rerun: 64) [ 435.146283][ T9693] CPU: 2 PID: 9693 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 435.151188][ T9693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 435.156033][ T9693] Call Trace: [ 435.157536][ T9693] [ 435.158831][ T9693] dump_stack_lvl+0x125/0x1b0 [ 435.160977][ T9693] should_fail_ex+0x496/0x5b0 [ 435.163150][ T9693] should_failslab+0x9/0x20 [ 435.165160][ T9693] kmem_cache_alloc_node+0x384/0x3f0 03:30:02 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) read$FUSE(r4, &(0x7f0000004a80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r5, &(0x7f00000001c0)={0x18, 0x0, r6, {0x8}}, 0x18) read$FUSE(r4, &(0x7f0000006ac0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) r8 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) ioctl$I2C_SLAVE_FORCE(r8, 0x706, 0x48) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x1, 0x1, 0x2ce8, 0x3, 0x3, 0x7f, {0x3, 0x9, 0x1ff, 0x9, 0x4282, 0xfffffffffffffffd, 0x1f, 0x3, 0x2, 0x4000, 0x1, r2, r3, 0x5, 0x18bb1777}}, {0x0, 0x11}}}, 0xa0) read$FUSE(r4, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, r7, {0x1, 0x5471, 0x0, {0x5, 0x1, 0xbe0, 0x2, 0xfa, 0x2, 0x5, 0xc6, 0xf8, 0xa000, 0x1, r2, r9, 0x3ff, 0x8}}}, 0x78) [ 435.167591][ T9693] ? alloc_unbound_pwq+0x41e/0xd00 [ 435.170182][ T9693] alloc_unbound_pwq+0x41e/0xd00 03:30:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 435.172494][ T9693] ? kasan_set_track+0x25/0x30 [ 435.174933][ T9693] apply_wqattrs_prepare+0x3be/0xa90 [ 435.177492][ T9693] apply_workqueue_attrs_locked+0xcb/0x150 [ 435.180269][ T9693] alloc_workqueue+0xdae/0x1490 [ 435.182618][ T9693] ? workqueue_sysfs_register+0x400/0x400 [ 435.185374][ T9693] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 435.187822][ T9693] kvm_mmu_init_vm+0x248/0x2e0 [ 435.190131][ T9693] kvm_arch_init_vm+0x39/0x720 [ 435.192437][ T9693] ? __kasan_kmalloc+0xa2/0xb0 [ 435.194735][ T9693] kvm_dev_ioctl+0xa31/0x1c20 [ 435.197022][ T9693] ? bit_wait_io_timeout+0x160/0x160 [ 435.199519][ T9693] ? __fget_files+0x272/0x410 [ 435.201750][ T9693] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.204335][ T9693] ? __fget_files+0x272/0x410 [ 435.206601][ T9693] ? bpf_lsm_file_ioctl+0x9/0x10 [ 435.208841][ T9693] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.210817][ T9693] __do_compat_sys_ioctl+0x2bf/0x330 [ 435.212782][ T9693] __do_fast_syscall_32+0x61/0xe0 [ 435.214637][ T9693] do_fast_syscall_32+0x33/0x70 [ 435.216457][ T9693] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 435.218802][ T9693] RIP: 0023:0xf7f82579 [ 435.220450][ T9693] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 435.227460][ T9693] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 435.230652][ T9693] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 435.233581][ T9693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 435.236511][ T9693] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 435.239481][ T9693] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 435.242372][ T9693] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.245269][ T9693] 03:30:02 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 30) 03:30:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x14, r1, 0x1}, 0x14}}, 0x20000850) 03:30:02 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r5, 0x0, 0x0) read$FUSE(r4, &(0x7f0000004a80)={0x2020}, 0x2020) (async) read$FUSE(r4, &(0x7f0000004a80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r5, &(0x7f00000001c0)={0x18, 0x0, r6, {0x8}}, 0x18) read$FUSE(r4, &(0x7f0000006ac0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r4, 0x0, 0x0) openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) (async) r8 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) ioctl$I2C_SLAVE_FORCE(r8, 0x706, 0x48) (async) ioctl$I2C_SLAVE_FORCE(r8, 0x706, 0x48) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x1, 0x1, 0x2ce8, 0x3, 0x3, 0x7f, {0x3, 0x9, 0x1ff, 0x9, 0x4282, 0xfffffffffffffffd, 0x1f, 0x3, 0x2, 0x4000, 0x1, r2, r3, 0x5, 0x18bb1777}}, {0x0, 0x11}}}, 0xa0) read$FUSE(r4, &(0x7f0000002a40)={0x2020}, 0x2020) (async) read$FUSE(r4, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, r7, {0x1, 0x5471, 0x0, {0x5, 0x1, 0xbe0, 0x2, 0xfa, 0x2, 0x5, 0xc6, 0xf8, 0xa000, 0x1, r2, r9, 0x3ff, 0x8}}}, 0x78) 03:30:02 executing program 0: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x44d8c49}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x84}, 0x20044000) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 435.269230][ T9707] FAULT_INJECTION: forcing a failure. [ 435.269230][ T9707] name failslab, interval 1, probability 0, space 0, times 0 03:30:02 executing program 0: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x44d8c49}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x84}, 0x20044000) (async, rerun: 64) bpf$MAP_CREATE(0x2, 0x0, 0x10) (rerun: 64) [ 435.274344][ T9707] CPU: 2 PID: 9707 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 03:30:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 435.278292][ T9707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 435.282222][ T9707] Call Trace: [ 435.283473][ T9707] [ 435.284608][ T9707] dump_stack_lvl+0x125/0x1b0 [ 435.286414][ T9707] should_fail_ex+0x496/0x5b0 [ 435.288206][ T9707] should_failslab+0x9/0x20 [ 435.289962][ T9707] kmem_cache_alloc_node+0x384/0x3f0 [ 435.291893][ T9707] ? alloc_unbound_pwq+0x41e/0xd00 [ 435.293780][ T9707] alloc_unbound_pwq+0x41e/0xd00 [ 435.295620][ T9707] apply_wqattrs_prepare+0x696/0xa90 [ 435.297669][ T9707] apply_workqueue_attrs_locked+0xcb/0x150 [ 435.299838][ T9707] alloc_workqueue+0xdae/0x1490 [ 435.301810][ T9707] ? workqueue_sysfs_register+0x400/0x400 [ 435.303996][ T9707] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 435.305879][ T9707] kvm_mmu_init_vm+0x248/0x2e0 [ 435.307706][ T9707] kvm_arch_init_vm+0x39/0x720 [ 435.309601][ T9707] ? __kasan_kmalloc+0xa2/0xb0 03:30:02 executing program 0: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0_macvtap\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3f}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x44d8c49}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x84}, 0x20044000) bpf$MAP_CREATE(0x2, 0x0, 0x10) [ 435.311362][ T9707] kvm_dev_ioctl+0xa31/0x1c20 03:30:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000680)={0x234, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x198, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x9, 0x1f, 0x4, 0x8}, {0x4, 0x9, 0x0, 0xc8bc}, {0x80, 0x2, 0xc2, 0x1}, {0x1ff, 0x7, 0x8, 0x9}, {0xbc, 0x3, 0xac, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffff801}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x234}, 0x1, 0x0, 0x0, 0x24008050}, 0x20000850) [ 435.313559][ T9707] ? bit_wait_io_timeout+0x160/0x160 [ 435.316046][ T9707] ? __fget_files+0x272/0x410 [ 435.317929][ T9707] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.319887][ T9707] ? __fget_files+0x272/0x410 [ 435.321616][ T9707] ? bpf_lsm_file_ioctl+0x9/0x10 [ 435.323423][ T9707] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.325361][ T9707] __do_compat_sys_ioctl+0x2bf/0x330 [ 435.327275][ T9707] __do_fast_syscall_32+0x61/0xe0 [ 435.329099][ T9707] do_fast_syscall_32+0x33/0x70 [ 435.330873][ T9707] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 435.333177][ T9707] RIP: 0023:0xf7f82579 [ 435.334670][ T9707] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 435.341639][ T9707] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 435.344659][ T9707] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 435.347503][ T9707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 435.350383][ T9707] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 435.353230][ T9707] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 435.356085][ T9707] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.358942][ T9707] 03:30:02 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 31) 03:30:02 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) [ 435.388823][ T9726] FAULT_INJECTION: forcing a failure. [ 435.388823][ T9726] name failslab, interval 1, probability 0, space 0, times 0 [ 435.393526][ T9726] CPU: 2 PID: 9726 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 435.397318][ T9726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 435.401039][ T9726] Call Trace: [ 435.402278][ T9726] [ 435.403384][ T9726] dump_stack_lvl+0x125/0x1b0 [ 435.405138][ T9726] should_fail_ex+0x496/0x5b0 [ 435.406845][ T9726] should_failslab+0x9/0x20 [ 435.408518][ T9726] kmem_cache_alloc_node+0x384/0x3f0 [ 435.410455][ T9726] ? alloc_unbound_pwq+0x41e/0xd00 [ 435.412379][ T9726] alloc_unbound_pwq+0x41e/0xd00 [ 435.414271][ T9726] apply_wqattrs_prepare+0x696/0xa90 [ 435.416255][ T9726] apply_workqueue_attrs_locked+0xcb/0x150 [ 435.418421][ T9726] alloc_workqueue+0xdae/0x1490 [ 435.420239][ T9726] ? workqueue_sysfs_register+0x400/0x400 [ 435.422326][ T9726] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 435.424208][ T9726] kvm_mmu_init_vm+0x248/0x2e0 [ 435.425964][ T9726] kvm_arch_init_vm+0x39/0x720 [ 435.427721][ T9726] ? __kasan_kmalloc+0xa2/0xb0 [ 435.429499][ T9726] kvm_dev_ioctl+0xa31/0x1c20 [ 435.431233][ T9726] ? bit_wait_io_timeout+0x160/0x160 [ 435.433186][ T9726] ? __fget_files+0x272/0x410 [ 435.435012][ T9726] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.436991][ T9726] ? __fget_files+0x272/0x410 [ 435.438730][ T9726] ? bpf_lsm_file_ioctl+0x9/0x10 [ 435.440498][ T9726] ? kvm_vcpu_stats_release+0x80/0x80 [ 435.442462][ T9726] __do_compat_sys_ioctl+0x2bf/0x330 [ 435.444426][ T9726] __do_fast_syscall_32+0x61/0xe0 [ 435.446278][ T9726] do_fast_syscall_32+0x33/0x70 [ 435.448072][ T9726] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 435.450385][ T9726] RIP: 0023:0xf7f82579 [ 435.451884][ T9726] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 435.458874][ T9726] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 435.461973][ T9726] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 435.464864][ T9726] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 435.467742][ T9726] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 435.470638][ T9726] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 435.473522][ T9726] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.476430][ T9726] 03:30:02 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 64) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async, rerun: 64) r5 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000a00)={0x2020}, 0x2020) (async, rerun: 32) write$FUSE_IOCTL(r5, 0x0, 0x0) (async, rerun: 32) read$FUSE(r4, &(0x7f0000004a80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_GETXATTR(r5, &(0x7f00000001c0)={0x18, 0x0, r6, {0x8}}, 0x18) (async) read$FUSE(r4, &(0x7f0000006ac0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) write$FUSE_IOCTL(r4, 0x0, 0x0) (async, rerun: 64) r8 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) ioctl$I2C_SLAVE_FORCE(r8, 0x706, 0x48) (async) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000000)={0xa0, 0x0, r1, {{0x1, 0x1, 0x2ce8, 0x3, 0x3, 0x7f, {0x3, 0x9, 0x1ff, 0x9, 0x4282, 0xfffffffffffffffd, 0x1f, 0x3, 0x2, 0x4000, 0x1, r2, r3, 0x5, 0x18bb1777}}, {0x0, 0x11}}}, 0xa0) (async) read$FUSE(r4, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, r7, {0x1, 0x5471, 0x0, {0x5, 0x1, 0xbe0, 0x2, 0xfa, 0x2, 0x5, 0xc6, 0xf8, 0xa000, 0x1, r2, r9, 0x3ff, 0x8}}}, 0x78) 03:30:02 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) 03:30:02 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (fail_nth: 32) 03:30:02 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xfffffc98) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$full(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002b40)={0x48, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/stat\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) r5 = openat$full(0xffffff9c, &(0x7f0000000900), 0x220000, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r4) sendmsg$BATADV_CMD_SET_VLAN(r5, &(0x7f0000002ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000009c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="373ab59e", @ANYRES16=r6, @ANYBLOB="100027bd7000fbdbdf251200000005002a000100000005003000000000000500290000000000050033000100000005002f000100000008003c00c5270000"], 0x44}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000000) write$FUSE_IOCTL(r4, 0x0, 0x0) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r7, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000002c40)={'\x00', 0x9, 0x2, 0x81}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x5, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x64f3a437, 0x29, &(0x7f0000000080)=""/41, 0x41100, 0x24, '\x00', r1, 0x4, r2, 0x8, &(0x7f0000000400)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xc, 0x5, 0x419c}, 0x10, r3, r4, 0x6, &(0x7f0000000780)=[r0, r7, r0], &(0x7f00000007c0)=[{0x4, 0x5, 0xf, 0x6}, {0x2, 0x1, 0xc, 0x1}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x1, 0xc, 0x2}, {0x4, 0x3, 0x9, 0xb}], 0x10, 0xcd7}, 0x90) r9 = openat$cuse(0xffffff9c, &(0x7f0000002cc0), 0x2, 0x0) write$FUSE_LSEEK(r9, &(0x7f0000002d00)={0x18, 0x0, r8, {0xa5}}, 0x18) [ 436.127626][ T9730] FAULT_INJECTION: forcing a failure. 03:30:02 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x8}, 0x8) [ 436.127626][ T9730] name failslab, interval 1, probability 0, space 0, times 0 [ 436.134650][ T9730] CPU: 2 PID: 9730 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 436.139444][ T9730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 436.144146][ T9730] Call Trace: [ 436.145733][ T9730] [ 436.147119][ T9730] dump_stack_lvl+0x125/0x1b0 [ 436.149374][ T9730] should_fail_ex+0x496/0x5b0 [ 436.151593][ T9730] should_failslab+0x9/0x20 [ 436.153756][ T9730] kmem_cache_alloc_node+0x384/0x3f0 03:30:03 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xfffffc98) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$full(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002b40)={0x48, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/stat\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) r5 = openat$full(0xffffff9c, &(0x7f0000000900), 0x220000, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r4) sendmsg$BATADV_CMD_SET_VLAN(r5, &(0x7f0000002ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000009c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="373ab59e", @ANYRES16=r6, @ANYBLOB="100027bd7000fbdbdf251200000005002a000100000005003000000000000500290000000000050033000100000005002f000100000008003c00c5270000"], 0x44}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000000) write$FUSE_IOCTL(r4, 0x0, 0x0) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r7, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000002c40)={'\x00', 0x9, 0x2, 0x81}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x5, &(0x7f0000002d40)=ANY=[@ANYBLOB="1800000000020000000000003e4c000018470000fcffffff00000000000080029500000000000000e81d2c1a5f71f7d9601f5ae9463489a89f18382216d8e8b661b074937deea6326eefb23f8e5d131e82c62554ba2fdbd94ea56f76240000000000000000a0f1602df0a00f85dda92c4cc6542b4e0875996b4d26af9401758d4a6f612d3f339570565de28036ac6a22d15c9673a40eef3bf5e79c6d343bdc618906008b448bbd3a282eb8b6cef59a8fd9d1952c49f9454c8c246f3c0db729f6837deb8b047819f54c59577821adaa11a41ec2d35e1120df6013c33fa9374f9df62f4fc5c678cc1a27e77353e71716abd995351d9d8306777f5f5b15f697eb763585de8d882b6b7890824a234a9cb7d9e8561bfd6111dd32fed221ccbf6d7f88b4049f16a951616f9547e37f0bd1f6450450482bfe8ddcaaf31547623593adc89c778b1c76d6f84fdc179949317c3a4d31dbb20b9ea3cca7af87a8021e4ba926861aa10cdb3e98916d520b5d972be01e685dd258278108c9502587c1c02a732b5b5b3084e11be42ac94a34e678d32095c40af7de320ada53efe2578164df0ea327e335aad0e962297e773f7efde6cb9ce686ebcabafb3db3db9c07c89871d81d780a3f3af95b15ba7a898cf02f0c6319ff468d6e8975000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x64f3a437, 0x29, &(0x7f0000000080)=""/41, 0x41100, 0x24, '\x00', r1, 0x4, r2, 0x8, &(0x7f0000000400)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xc, 0x5, 0x419c}, 0x10, r3, r4, 0x6, &(0x7f0000000780)=[r0, r7, r0], &(0x7f00000007c0)=[{0x4, 0x5, 0xf, 0x6}, {0x2, 0x1, 0xc, 0x1}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x1, 0xc, 0x2}, {0x4, 0x3, 0x9, 0xb}], 0x10, 0xcd7}, 0x90) r9 = openat$cuse(0xffffff9c, &(0x7f0000002cc0), 0x2, 0x0) write$FUSE_LSEEK(r9, &(0x7f0000002d00)={0x18, 0x0, r8, {0xa5}}, 0x18) bpf$MAP_CREATE(0x2, 0x0, 0xfffffc98) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) openat$full(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) (async) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002b40)={0x48, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/stat\x00', 0x0, 0x0) (async) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) (async) openat$full(0xffffff9c, &(0x7f0000000900), 0x220000, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r4) (async) sendmsg$BATADV_CMD_SET_VLAN(r5, &(0x7f0000002ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000009c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="373ab59e", @ANYRES16=r6, @ANYBLOB="100027bd7000fbdbdf251200000005002a000100000005003000000000000500290000000000050033000100000005002f000100000008003c00c5270000"], 0x44}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000000) (async) write$FUSE_IOCTL(r4, 0x0, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r7, 0x0, 0x0) (async) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000002c40)={'\x00', 0x9, 0x2, 0x81}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x5, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x64f3a437, 0x29, &(0x7f0000000080)=""/41, 0x41100, 0x24, '\x00', r1, 0x4, r2, 0x8, &(0x7f0000000400)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xc, 0x5, 0x419c}, 0x10, r3, r4, 0x6, &(0x7f0000000780)=[r0, r7, r0], &(0x7f00000007c0)=[{0x4, 0x5, 0xf, 0x6}, {0x2, 0x1, 0xc, 0x1}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x1, 0xc, 0x2}, {0x4, 0x3, 0x9, 0xb}], 0x10, 0xcd7}, 0x90) (async) openat$cuse(0xffffff9c, &(0x7f0000002cc0), 0x2, 0x0) (async) write$FUSE_LSEEK(r9, &(0x7f0000002d00)={0x18, 0x0, r8, {0xa5}}, 0x18) (async) [ 436.156239][ T9730] ? alloc_unbound_pwq+0x41e/0xd00 [ 436.158910][ T9730] alloc_unbound_pwq+0x41e/0xd00 [ 436.161311][ T9730] apply_wqattrs_prepare+0x696/0xa90 03:30:03 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) [ 436.163804][ T9730] apply_workqueue_attrs_locked+0xcb/0x150 [ 436.166682][ T9730] alloc_workqueue+0xdae/0x1490 [ 436.168996][ T9730] ? workqueue_sysfs_register+0x400/0x400 [ 436.171631][ T9730] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 436.174057][ T9730] kvm_mmu_init_vm+0x248/0x2e0 [ 436.176333][ T9730] kvm_arch_init_vm+0x39/0x720 [ 436.178601][ T9730] ? __kasan_kmalloc+0xa2/0xb0 [ 436.180822][ T9730] kvm_dev_ioctl+0xa31/0x1c20 03:30:03 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x10) r0 = openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$fuse(0xffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002a40)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) ioctl$I2C_SMBUS(r1, 0x720, &(0x7f0000000200)={0x1, 0x5, 0x7, &(0x7f00000001c0)={0x1d, "4584a159f51076c78b448522d6701132faafcf817a33b41fbd4970f2d4399605e4"}}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000100)={&(0x7f00000000c0)=[{0xfff, 0x0, 0x4, &(0x7f0000000000)="a0862c82"}, {0x3, 0x1610, 0x2, &(0x7f0000000040)="b57c"}, {0x3, 0x1000, 0x3d, &(0x7f0000000080)="e27b601aff6ea9e28ec37a7d094c55e4e5aee34d9fc366a3ce360767a6c6ce12be32516c5483b86e17c28090b0510fe7870860618b99075b6a04b16461"}], 0x3}) [ 436.183001][ T9730] ? bit_wait_io_timeout+0x160/0x160 [ 436.185507][ T9730] ? __fget_files+0x272/0x410 [ 436.187733][ T9730] ? kvm_vcpu_stats_release+0x80/0x80 [ 436.190273][ T9730] ? __fget_files+0x272/0x410 [ 436.192522][ T9730] ? bpf_lsm_file_ioctl+0x9/0x10 03:30:03 executing program 3: openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) write$FUSE_IOCTL(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) openat$cuse(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000a00)={0x2020}, 0x2020) (async) [ 436.194762][ T9730] ? kvm_vcpu_stats_release+0x80/0x80 [ 436.197368][ T9730] __do_compat_sys_ioctl+0x2bf/0x330 [ 436.199969][ T9730] __do_fast_syscall_32+0x61/0xe0 [ 436.202307][ T9730] do_fast_syscall_32+0x33/0x70 [ 436.204565][ T9730] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 436.207528][ T9730] RIP: 0023:0xf7f82579 03:30:03 executing program 0: r0 = bpf$MAP_CREATE(0x2, 0x0, 0xfffffc98) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = openat$full(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002b40)={0x48, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r4 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/stat\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) r5 = openat$full(0xffffff9c, &(0x7f0000000900), 0x220000, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r4) sendmsg$BATADV_CMD_SET_VLAN(r5, &(0x7f0000002ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000009c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="373ab59e", @ANYRES16=r6, @ANYBLOB="100027bd7000fbdbdf251200000005002a000100000005003000000000000500290000000000050033000100000005002f000100000008003c00c5270000"], 0x44}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000000) write$FUSE_IOCTL(r4, 0x0, 0x0) r7 = openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000a00)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r7, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000002c40)={'\x00', 0x9, 0x2, 0x81}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x5, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x64f3a437, 0x29, &(0x7f0000000080)=""/41, 0x41100, 0x24, '\x00', r1, 0x4, r2, 0x8, &(0x7f0000000400)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xc, 0x5, 0x419c}, 0x10, r3, r4, 0x6, &(0x7f0000000780)=[r0, r7, r0], &(0x7f00000007c0)=[{0x4, 0x5, 0xf, 0x6}, {0x2, 0x1, 0xc, 0x1}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x1, 0xc, 0x2}, {0x4, 0x3, 0x9, 0xb}], 0x10, 0xcd7}, 0x90) r9 = openat$cuse(0xffffff9c, &(0x7f0000002cc0), 0x2, 0x0) write$FUSE_LSEEK(r9, &(0x7f0000002d00)={0x18, 0x0, r8, {0xa5}}, 0x18) bpf$MAP_CREATE(0x2, 0x0, 0xfffffc98) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}], 0x8, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) openat$full(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) (async) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002bc0)={&(0x7f0000002b40)={0x48, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000001) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000480)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/stat\x00', 0x0, 0x0) (async) read$FUSE(r4, &(0x7f0000000a00)={0x2020}, 0x2020) (async) openat$full(0xffffff9c, &(0x7f0000000900), 0x220000, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), r4) (async) sendmsg$BATADV_CMD_SET_VLAN(r5, &(0x7f0000002ac0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000009c0)={&(0x7f0000002a40)=ANY=[@ANYBLOB="373ab59e", @ANYRES16=r6, @ANYBLOB="100027bd7000fbdbdf251200000005002a000100000005003000000000000500290000000000050033000100000005002f000100000008003c00c5270000"], 0x44}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000000) (async) write$FUSE_IOCTL(r4, 0x0, 0x0) (async) openat$procfs(0xffffff9c, &(0x7f0000000400)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) read$FUSE(r7, &(0x7f0000000a00)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r7, 0x0, 0x0) (async) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000002c40)={'\x00', 0x9, 0x2, 0x81}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x5, &(0x7f0000002d40)=ANY=[@ANYBLOB="1800000000020000000000003e4c000018470000fcffffff00000000000080029500000000000000e81d2c1a5f71f7d9601f5ae9463489a89f18382216d8e8b661b074937deea6326eefb23f8e5d131e82c62554ba2fdbd94ea56f76240000000000000000a0f1602df0a00f85dda92c4cc6542b4e0875996b4d26af9401758d4a6f612d3f339570565de28036ac6a22d15c9673a40eef3bf5e79c6d343bdc618906008b448bbd3a282eb8b6cef59a8fd9d1952c49f9454c8c246f3c0db729f6837deb8b047819f54c59577821adaa11a41ec2d35e1120df6013c33fa9374f9df62f4fc5c678cc1a27e77353e71716abd995351d9d8306777f5f5b15f697eb763585de8d882b6b7890824a234a9cb7d9e8561bfd6111dd32fed221ccbf6d7f88b4049f16a951616f9547e37f0bd1f6450450482bfe8ddcaaf31547623593adc89c778b1c76d6f84fdc179949317c3a4d31dbb20b9ea3cca7af87a8021e4ba926861aa10cdb3e98916d520b5d972be01e685dd258278108c9502587c1c02a732b5b5b3084e11be42ac94a34e678d32095c40af7de320ada53efe2578164df0ea327e335aad0e962297e773f7efde6cb9ce686ebcabafb3db3db9c07c89871d81d780a3f3af95b15ba7a898cf02f0c6319ff468d6e8975000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x64f3a437, 0x29, &(0x7f0000000080)=""/41, 0x41100, 0x24, '\x00', r1, 0x4, r2, 0x8, &(0x7f0000000400)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xc, 0x5, 0x419c}, 0x10, r3, r4, 0x6, &(0x7f0000000780)=[r0, r7, r0], &(0x7f00000007c0)=[{0x4, 0x5, 0xf, 0x6}, {0x2, 0x1, 0xc, 0x1}, {0x4, 0x3, 0x6, 0x8}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x1, 0xc, 0x2}, {0x4, 0x3, 0x9, 0xb}], 0x10, 0xcd7}, 0x90) (async) openat$cuse(0xffffff9c, &(0x7f0000002cc0), 0x2, 0x0) (async) write$FUSE_LSEEK(r9, &(0x7f0000002d00)={0x18, 0x0, r8, {0xa5}}, 0x18) (async) [ 436.209441][ T9730] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 436.218128][ T9730] RSP: 002b:00000000f7f7d5ac EFLAGS: 00000292 ORIG_RAX: 0000000000000036 [ 436.221432][ T9730] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000000ae01 [ 436.225127][ T9730] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 436.228702][ T9730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 436.232201][ T9730] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 436.235908][ T9730] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 436.239608][ T9730] [ 436.243017][ T3] ================================================================== [ 436.245973][ T3] BUG: KASAN: slab-use-after-free in pwq_release_workfn+0x339/0x380 [ 436.248874][ T3] Read of size 4 at addr ffff8880233349c0 by task pool_workqueue_/3 [ 436.252380][ T3] [ 436.253305][ T3] CPU: 1 PID: 3 Comm: pool_workqueue_ Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 436.257112][ T3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 436.262777][ T3] Call Trace: [ 436.264267][ T3] [ 436.265583][ T3] dump_stack_lvl+0xd9/0x1b0 [ 436.267638][ T3] print_report+0xc4/0x620 [ 436.269637][ T3] ? __virt_addr_valid+0x5e/0x2d0 [ 436.271881][ T3] ? __phys_addr+0xc6/0x140 [ 436.273692][ T3] kasan_report+0xda/0x110 [ 436.275320][ T3] ? pwq_release_workfn+0x339/0x380 [ 436.277240][ T3] ? pwq_release_workfn+0x339/0x380 [ 436.279144][ T3] pwq_release_workfn+0x339/0x380 [ 436.281003][ T3] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.282946][ T3] kthread_worker_fn+0x2ff/0xac0 [ 436.284758][ T3] ? put_unbound_pool+0x7c0/0x7c0 [ 436.286590][ T3] ? kthread_freezable_should_stop+0x190/0x190 [ 436.288822][ T3] kthread+0x33c/0x440 [ 436.290307][ T3] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.292205][ T3] ? kthread_complete_and_exit+0x40/0x40 [ 436.294262][ T3] ret_from_fork+0x45/0x80 [ 436.295899][ T3] ? kthread_complete_and_exit+0x40/0x40 [ 436.297945][ T3] ret_from_fork_asm+0x11/0x20 [ 436.299691][ T3] [ 436.300849][ T3] [ 436.301730][ T3] Allocated by task 9730: [ 436.303298][ T3] kasan_save_stack+0x33/0x50 [ 436.305038][ T3] kasan_set_track+0x25/0x30 [ 436.306726][ T3] __kasan_kmalloc+0xa2/0xb0 [ 436.308415][ T3] alloc_workqueue+0x16f/0x1490 [ 436.310188][ T3] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 436.312186][ T3] kvm_mmu_init_vm+0x248/0x2e0 [ 436.314043][ T3] kvm_arch_init_vm+0x39/0x720 [ 436.315815][ T3] kvm_dev_ioctl+0xa31/0x1c20 [ 436.317535][ T3] __do_compat_sys_ioctl+0x2bf/0x330 [ 436.319438][ T3] __do_fast_syscall_32+0x61/0xe0 [ 436.321277][ T3] do_fast_syscall_32+0x33/0x70 [ 436.323040][ T3] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 436.325325][ T3] [ 436.326194][ T3] Freed by task 9730: [ 436.327636][ T3] kasan_save_stack+0x33/0x50 [ 436.329407][ T3] kasan_set_track+0x25/0x30 [ 436.331130][ T3] kasan_save_free_info+0x2b/0x40 [ 436.332961][ T3] ____kasan_slab_free+0x15b/0x1b0 [ 436.334815][ T3] slab_free_freelist_hook+0x114/0x1e0 [ 436.336808][ T3] __kmem_cache_free+0xb8/0x2f0 [ 436.338574][ T3] alloc_workqueue+0xe76/0x1490 [ 436.340358][ T3] kvm_mmu_init_tdp_mmu+0x23/0x100 [ 436.342208][ T3] kvm_mmu_init_vm+0x248/0x2e0 [ 436.343954][ T3] kvm_arch_init_vm+0x39/0x720 [ 436.345691][ T3] kvm_dev_ioctl+0xa31/0x1c20 [ 436.347466][ T3] __do_compat_sys_ioctl+0x2bf/0x330 [ 436.349388][ T3] __do_fast_syscall_32+0x61/0xe0 [ 436.351204][ T3] do_fast_syscall_32+0x33/0x70 [ 436.352974][ T3] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 436.355257][ T3] [ 436.356169][ T3] Last potentially related work creation: [ 436.358210][ T3] kasan_save_stack+0x33/0x50 [ 436.359937][ T3] __kasan_record_aux_stack+0xbc/0xd0 [ 436.361885][ T3] __call_rcu_common.constprop.0+0x9a/0x790 [ 436.364033][ T3] __key_link+0x14a/0x370 [ 436.365661][ T3] key_link+0x26d/0x310 [ 436.367173][ T3] call_sbin_request_key+0x41d/0xe10 [ 436.369108][ T3] request_key_and_link+0xeaf/0x1370 [ 436.371015][ T3] __do_sys_request_key+0x23b/0x3d0 [ 436.372903][ T3] __do_fast_syscall_32+0x61/0xe0 [ 436.374717][ T3] do_fast_syscall_32+0x33/0x70 [ 436.376496][ T3] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 436.378770][ T3] [ 436.379643][ T3] Second to last potentially related work creation: [ 436.382025][ T3] kasan_save_stack+0x33/0x50 [ 436.383730][ T3] __kasan_record_aux_stack+0xbc/0xd0 [ 436.385681][ T3] kvfree_call_rcu+0x70/0xbe0 [ 436.387389][ T3] ma_put+0x11a/0x170 [ 436.388846][ T3] __ipv6_dev_mc_dec+0x297/0x360 [ 436.390701][ T3] ipv6_mc_destroy_dev+0x2cb/0x680 [ 436.392561][ T3] addrconf_ifdown.isra.0+0x1597/0x1c50 [ 436.394548][ T3] addrconf_notify+0x22d/0x1920 [ 436.396325][ T3] notifier_call_chain+0xb6/0x3b0 [ 436.398139][ T3] call_netdevice_notifiers_info+0xb9/0x130 [ 436.400281][ T3] unregister_netdevice_many_notify+0x85f/0x1a20 [ 436.402561][ T3] sit_exit_batch_net+0x4aa/0x580 [ 436.404392][ T3] ops_exit_list+0x125/0x170 [ 436.406061][ T3] cleanup_net+0x505/0xb20 [ 436.407669][ T3] process_one_work+0x884/0x15c0 [ 436.409467][ T3] worker_thread+0x8b9/0x1290 [ 436.411164][ T3] kthread+0x33c/0x440 [ 436.412637][ T3] ret_from_fork+0x45/0x80 [ 436.414248][ T3] ret_from_fork_asm+0x11/0x20 [ 436.416084][ T3] [ 436.416951][ T3] The buggy address belongs to the object at ffff888023334800 [ 436.416951][ T3] which belongs to the cache kmalloc-512 of size 512 [ 436.421905][ T3] The buggy address is located 448 bytes inside of [ 436.421905][ T3] freed 512-byte region [ffff888023334800, ffff888023334a00) [ 436.426773][ T3] [ 436.427642][ T3] The buggy address belongs to the physical page: [ 436.429996][ T3] page:ffffea00008ccd00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23334 [ 436.433652][ T3] head:ffffea00008ccd00 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 436.436855][ T3] anon flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 436.439863][ T3] page_type: 0xffffffff() [ 436.441435][ T3] raw: 00fff00000000840 ffff888012c42c80 0000000000000000 dead000000000001 [ 436.444508][ T3] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 436.447553][ T3] page dumped because: kasan: bad access detected [ 436.449926][ T3] page_owner tracks the page as allocated [ 436.452026][ T3] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5163, tgid 5163 (syz-executor.0), ts 67243619777, free_ts 20156338725 [ 436.459629][ T3] post_alloc_hook+0x2cf/0x340 [ 436.461229][ T3] get_page_from_freelist+0xee0/0x2f20 [ 436.462941][ T3] __alloc_pages+0x1d0/0x4a0 [ 436.464480][ T3] alloc_pages+0x1a9/0x270 [ 436.466095][ T3] allocate_slab+0x251/0x380 [ 436.467758][ T3] ___slab_alloc+0x8c7/0x1580 [ 436.469464][ T3] __slab_alloc.constprop.0+0x56/0xa0 [ 436.471391][ T3] __kmem_cache_alloc_node+0x131/0x340 [ 436.473366][ T3] kmalloc_trace+0x25/0xe0 [ 436.474994][ T3] __ipv6_dev_mc_inc+0x2b7/0xc40 [ 436.476845][ T3] ipv6_add_dev+0xa85/0x13d0 [ 436.478525][ T3] ipv6_find_idev+0x18a/0x210 [ 436.480238][ T3] inet6_rtm_newaddr+0x462/0x1aa0 [ 436.482066][ T3] rtnetlink_rcv_msg+0x3c4/0xdf0 [ 436.483881][ T3] netlink_rcv_skb+0x16b/0x440 [ 436.485658][ T3] netlink_unicast+0x536/0x810 [ 436.487379][ T3] page last free stack trace: [ 436.489083][ T3] free_unref_page_prepare+0x476/0xa40 [ 436.491020][ T3] free_unref_page+0x33/0x3b0 [ 436.492725][ T3] __unfreeze_partials+0x21d/0x240 [ 436.494568][ T3] qlist_free_all+0x6a/0x170 [ 436.496328][ T3] kasan_quarantine_reduce+0x18e/0x1d0 [ 436.498287][ T3] __kasan_slab_alloc+0x65/0x90 [ 436.500048][ T3] kmem_cache_alloc+0x16c/0x3b0 [ 436.501806][ T3] getname_flags.part.0+0x50/0x4d0 [ 436.503676][ T3] getname+0x90/0xe0 [ 436.505122][ T3] do_sys_openat2+0x100/0x1e0 [ 436.506816][ T3] __x64_sys_openat+0x175/0x210 [ 436.508585][ T3] do_syscall_64+0x38/0xb0 [ 436.510199][ T3] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 436.512343][ T3] [ 436.513220][ T3] Memory state around the buggy address: [ 436.515239][ T3] ffff888023334880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 436.518123][ T3] ffff888023334900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 436.520994][ T3] >ffff888023334980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 436.523847][ T3] ^ [ 436.526065][ T3] ffff888023334a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 436.528928][ T3] ffff888023334a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 436.531776][ T3] ================================================================== [ 436.537019][ T3] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 436.539712][ T3] CPU: 0 PID: 3 Comm: pool_workqueue_ Not tainted 6.6.0-rc1-syzkaller-00269-ge789286468a9 #0 [ 436.543934][ T3] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 436.547611][ T3] Call Trace: [ 436.548867][ T3] [ 436.550008][ T3] dump_stack_lvl+0xd9/0x1b0 [ 436.551714][ T3] panic+0x6a6/0x750 [ 436.553187][ T3] ? panic_smp_self_stop+0xa0/0xa0 [ 436.555092][ T3] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 436.557397][ T3] ? preempt_schedule_thunk+0x1a/0x30 [ 436.559388][ T3] ? preempt_schedule_common+0x45/0xc0 [ 436.561431][ T3] check_panic_on_warn+0xab/0xb0 [ 436.563241][ T3] end_report+0x108/0x150 [ 436.564862][ T3] kasan_report+0xea/0x110 [ 436.566498][ T3] ? pwq_release_workfn+0x339/0x380 [ 436.568429][ T3] ? pwq_release_workfn+0x339/0x380 [ 436.570373][ T3] pwq_release_workfn+0x339/0x380 [ 436.572227][ T3] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.574156][ T3] kthread_worker_fn+0x2ff/0xac0 [ 436.576031][ T3] ? put_unbound_pool+0x7c0/0x7c0 [ 436.577880][ T3] ? kthread_freezable_should_stop+0x190/0x190 [ 436.580185][ T3] kthread+0x33c/0x440 [ 436.581712][ T3] ? _raw_spin_unlock_irq+0x23/0x50 [ 436.583605][ T3] ? kthread_complete_and_exit+0x40/0x40 [ 436.585698][ T3] ret_from_fork+0x45/0x80 [ 436.587357][ T3] ? kthread_complete_and_exit+0x40/0x40 [ 436.589430][ T3] ret_from_fork_asm+0x11/0x20 [ 436.591288][ T3] [ 436.593324][ T3] Kernel Offset: disabled [ 436.594947][ T3] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:30:03 Registers: info registers vcpu 0 CPU#0 RAX=000000000010f161 RBX=0000000000000000 RCX=ffffffff8a3e38ee RDX=0000000000000000 RSI=ffffffff8a8cab20 RDI=ffffffff8ae92ba0 RBP=fffffbfff1912b08 RSP=ffffffff8c807e20 R8 =0000000000000001 R9 =ffffed10058c6dbd R10=ffff88802c636deb R11=0000000000000000 R12=0000000000000000 R13=ffffffff8c895840 R14=ffffffff8ece3a10 R15=0000000000000000 RIP=ffffffff8a3e4b3f RFL=00000242 [---Z---] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c600000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f7f6ad80 CR3=00000000218ee000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 Opmask00=0000000004300000 Opmask01=00000000fffffffa Opmask02=0000000000000000 Opmask03=0000000000000000 Opmask04=0000000000000000 Opmask05=0000000000000000 Opmask06=0000000000000000 Opmask07=0000000000000000 ZMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 e3996af58ee2b9a6 0075e0d736cd6688 ZMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 e60399ca9469d900 1e3839b0f396b3eb ZMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 a29031a7d8d4dc72 c6d93d72c16a89fb ZMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 5b67851372670fe1 8a4ed04d9143b4f5 ZMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000017240 ZMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000040 ZMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000010900000000 25f365a0000419eb ZMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000109 0000000000000109 ZMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000109000055dc 25e80fd200029f4a ZMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 25f8da5e000ff43f 0000000025e7205a ZMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 4c45080c179272b3 87faf2f80cb4b9c4 ZMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8209f4ac69c233b1 8974f9f7b2863326 ZMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 a54ff53a3c6ef372 bb67ae856a09e667 ZMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 5be0cd191f83d9ab 9b05688c510e527f ZMM16=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM17=0000000000000000 0000000000000000 0000000000000000 0000000000000000 2525252525252525 2525252525252525 2525252525252525 2525252525252525 ZMM18=0000000000000000 0000000000000000 0000000000000000 0000000000000000 4f6e3a6d5e007325 2e73250064252e73 2500656c6f736e6f 632f7665642f000a ZMM19=0000000000000000 0000000000000000 0000000000000000 0000000000000000 4f4b1f485e005600 0b56000041000b56 000040494a564b4a 460a5340410a000a ZMM20=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 00000000000a000a ZMM21=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM22=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM23=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM24=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM25=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM26=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM27=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM28=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM29=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM30=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM31=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 CPU#1 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff849bb2d5 RDI=ffffffff9255dd40 RBP=ffffffff9255dd00 RSP=ffffc90000357888 R8 =0000000000000001 R9 =000000000000001f R10=0000000000000000 R11=6572617764726148 R12=0000000000000000 R13=0000000000000031 R14=ffffffff849bb270 R15=0000000000000000 RIP=ffffffff849bb2ff RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c700000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f7ea5ea0 CR3=000000005ac08000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 Opmask00=0000000000000000 Opmask01=0000000000000000 Opmask02=0000000000000000 Opmask03=0000000000000000 Opmask04=0000000000000000 Opmask05=0000000000000000 Opmask06=0000000000000000 Opmask07=0000000000000000 ZMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000052 ZMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ffffffffffffffff ffffffff0f0e0d0c ZMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM16=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM17=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM18=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM19=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM20=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM21=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM22=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM23=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM24=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM25=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM26=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM27=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM28=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM29=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM30=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM31=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 2 CPU#2 RAX=0000000000106acd RBX=0000000000000002 RCX=ffffffff8a3e38ee RDX=0000000000000000 RSI=ffffffff8a8cab20 RDI=ffffffff8ae92ba0 RBP=ffffed1002857480 RSP=ffffc90000467e10 R8 =0000000000000001 R9 =ffffed1005906dbd R10=ffff88802c836deb R11=0000000000000000 R12=0000000000000002 R13=ffff8880142ba400 R14=ffffffff8ece3a10 R15=0000000000000000 RIP=ffffffff8a3e4b3f RFL=00000242 [---Z---] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c800000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000091000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000008f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000000 CR3=0000000058297000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 Opmask00=0000000000000000 Opmask01=0000000000000000 Opmask02=0000000000000000 Opmask03=0000000000000000 Opmask04=0000000000000000 Opmask05=0000000000000000 Opmask06=0000000000000000 Opmask07=0000000000000000 ZMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000052 ZMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ffffffffffffffff ffffffff0f0e0d0c ZMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM16=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM17=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM18=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM19=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM20=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM21=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM22=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM23=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM24=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM25=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM26=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM27=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM28=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM29=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM30=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM31=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 3 CPU#3 RAX=0000000000120ed7 RBX=0000000000000003 RCX=ffffffff8a3e38ee RDX=0000000000000000 RSI=ffffffff8a8cab20 RDI=ffffffff8ae92ba0 RBP=ffffed1002857900 RSP=ffffc90000477e10 R8 =0000000000000001 R9 =ffffed1005926dbd R10=ffff88802c936deb R11=0000000000000000 R12=0000000000000003 R13=ffff8880142bc800 R14=ffffffff8ece3a10 R15=0000000000000000 RIP=ffffffff8a3e4b3f RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c900000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe00000d8000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000d6000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f7ed1da4 CR3=000000000c976000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 Opmask00=0000000000000000 Opmask01=0000000000000000 Opmask02=0000000000000000 Opmask03=0000000000000000 Opmask04=0000000000000000 Opmask05=0000000000000000 Opmask06=0000000000000000 Opmask07=0000000000000000 ZMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 4c45080c179272b3 87faf2f80cb4b9c4 ZMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8209f4ac69c233b1 8974f9f7b2863326 ZMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 8976dd982b50cfd3 1be121e631ef3c0f ZMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 f1b6af363ee4ccb3 7e38099a6eb0e00d ZMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000017200 ZMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000040 ZMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000010900000109 257669fc2594d94e ZMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000109 0000010900000109 ZMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 000001092526cc3a 23da351400423fce ZMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 25b58b9825dcac98 000001092361e5f6 ZMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 7b1dc9d365a671fb 70ccb028a52a44ac ZMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ca1988a1c7fdf2f7 55f01fd36306da54 ZMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 a54ff53a3c6ef372 bb67ae856a09e667 ZMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 5be0cd191f83d9ab 9b05688c510e527f ZMM16=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM17=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM18=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM19=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM20=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM21=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM22=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM23=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM24=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM25=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM26=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM27=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM28=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM29=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM30=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 ZMM31=0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000