f}}, './file0\x00'}) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000140)={0x2, 0xfffffff7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc0000}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:38 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) clock_getres(0x6, &(0x7f0000000000)) (async) clock_gettime(0x6, &(0x7f0000000040)) 00:45:38 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x0, "", 0x8}, {0x1}]}}}}, 0x38) 00:45:38 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fffffff}}, './file0\x00'}) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000140)={0x2, 0xfffffff7}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) 00:45:38 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x0, "", 0x8}, {0x1}]}}}}, 0x38) 00:45:38 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:38 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) clock_getres(0x6, &(0x7f0000000000)) (async, rerun: 32) clock_gettime(0x6, &(0x7f0000000040)) (rerun: 32) 00:45:38 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fffffff}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) 00:45:39 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x0, "", 0x8}, {0x1}]}}}}, 0x38) 00:45:39 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x63, 0x36, 0x37, 0x31, 0x30, 0x36, 0x31, 0x38, 0x31, 0x39, 0x12d9dc1cdc7c29c, 0x31, 0x34, 0x31, 0x35, 0x64]}, &(0x7f0000000100)={0x0, "c172cf8a5e8286dedf70de4b7286fc163c7456a47ab0c93f4813b37b12a759b1a9af3647b57d67f6a0fb619318a1480cbd6527f3b271ff04c960d2d6ba4dbefe", 0x10}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}]}}}}, 0x33) 00:45:39 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x63, 0x36, 0x37, 0x31, 0x30, 0x36, 0x31, 0x38, 0x31, 0x39, 0x12d9dc1cdc7c29c, 0x31, 0x34, 0x31, 0x35, 0x64]}, &(0x7f0000000100)={0x0, "c172cf8a5e8286dedf70de4b7286fc163c7456a47ab0c93f4813b37b12a759b1a9af3647b57d67f6a0fb619318a1480cbd6527f3b271ff04c960d2d6ba4dbefe", 0x10}, 0x48, 0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x3, "f052d6", 0x8}, {0x1}]}}}}, 0x3b) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x63, 0x36, 0x37, 0x31, 0x30, 0x36, 0x31, 0x38, 0x31, 0x39, 0x12d9dc1cdc7c29c, 0x31, 0x34, 0x31, 0x35, 0x64]}, &(0x7f0000000100)={0x0, "c172cf8a5e8286dedf70de4b7286fc163c7456a47ab0c93f4813b37b12a759b1a9af3647b57d67f6a0fb619318a1480cbd6527f3b271ff04c960d2d6ba4dbefe", 0x10}, 0x48, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}]}}}}, 0x33) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x3, "f052d6", 0x8}, {0x1}]}}}}, 0x3b) 00:45:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1c, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ff00040000000000008d487fdbb09fbc67ebf8a776ddacf48a86deed8e92631dcd5a0364a6f9840a90c6f4e8000000000000004d432a1f5697ffbd410f0bc927d7954f342e896d58fbfb06778979eb86253db2956d801b3afee588f7dd1c5e1fa5c18265643ba15b627f5ff166aa8722278be42682386259ca6abe58c4670cf94517d05b0988f34c3d6bf7f761411e687074f919b869a4f30bc13ac00bed8f469df40974b69ec8fedf8d7340c778b224d39b9b16f622cdd9224d423162a7577c2c155efddd09bd18c7867f311dc462ec42eabca9ea717415868e1806b2bcc6acb912256813ec26d69c52cfeada09f086c44de7a0315ec23afc9b75025d77b0ff79a6", @ANYRES32=r0, @ANYBLOB="0000000000000000180000000900000000000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x20, 0x8f, &(0x7f0000000100)=""/143, 0x40f00, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0xff, 0x2}, 0x10}, 0x80) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}]}}}}, 0x33) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x3, "f052d6", 0x8}, {0x1}]}}}}, 0x3b) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 2739.201660][ T3112] Bluetooth: hci4: command 0x201b tx timeout 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1c, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ff00040000000000008d487fdbb09fbc67ebf8a776ddacf48a86deed8e92631dcd5a0364a6f9840a90c6f4e8000000000000004d432a1f5697ffbd410f0bc927d7954f342e896d58fbfb06778979eb86253db2956d801b3afee588f7dd1c5e1fa5c18265643ba15b627f5ff166aa8722278be42682386259ca6abe58c4670cf94517d05b0988f34c3d6bf7f761411e687074f919b869a4f30bc13ac00bed8f469df40974b69ec8fedf8d7340c778b224d39b9b16f622cdd9224d423162a7577c2c155efddd09bd18c7867f311dc462ec42eabca9ea717415868e1806b2bcc6acb912256813ec26d69c52cfeada09f086c44de7a0315ec23afc9b75025d77b0ff79a6", @ANYRES32=r0, @ANYBLOB="0000000000000000180000000900000000000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x20, 0x8f, &(0x7f0000000100)=""/143, 0x40f00, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0xff, 0x2}, 0x10}, 0x80) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3e}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x0, 0x0, @any, 0x4, "a2e273fc"}]}}}}, 0x41) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x4, "f052d6e2", 0x8}, {0x1}]}}}}, 0x3c) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x6, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1c, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000180000000900000000000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x20, 0x8f, &(0x7f0000000100)=""/143, 0x40f00, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0xff, 0x2}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1c, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000000000000180000000900000000000000030000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x20, 0x8f, &(0x7f0000000100)=""/143, 0x40f00, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x7, 0xff, 0x2}, 0x10}, 0x80) (async) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x4, "f052d6e2", 0x8}, {0x1}]}}}}, 0x3c) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x6, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/38, 0x26, 0x2021, &(0x7f0000000040)={{0x3, @null, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x2b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {}]}}}}, 0x2e) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x4, "f052d6e2", 0x8}, {0x1}]}}}}, 0x3c) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc"}, {0x1}]}}}}, 0x3d) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x2b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {}]}}}}, 0x2e) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x6, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/38, 0x26, 0x2021, &(0x7f0000000040)={{0x3, @null, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x1, 0x1}, 0x1e) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc"}, {0x1}]}}}}, 0x3d) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x1e) 00:45:39 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async, rerun: 64) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 64) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) (async) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/38, 0x26, 0x2021, &(0x7f0000000040)={{0x3, @null, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x2b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {}]}}}}, 0x2e) 00:45:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc"}, {0x1}]}}}}, 0x3d) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x0, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x1e) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x1b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x1e) 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, '\x00', 0x1}}}, 0xd) syz_emit_vhci(&(0x7f0000001180)=@HCI_EVENT_PKT={0x4, @hci_ev_logical_link_complete={{0x45, 0x5}, {0x4, 0xc9, 0xc9, 0x4}}}, 0x8) add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffd) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1004) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x0, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1e) 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0xc9, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0xc9, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x1b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x1e) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x0, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x1b}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x1e) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="03c900b27423c9dbb02c63c14e6f08b49cce83e7f7731c69adad4c029a06a13be999259630c1d6990dc37d62704edcf868d920540ac2326dbb2e52ee26cbc49f2c1fb8789a53203ddf521488933b88b867cb898a07eef44ec44cbcd5f6b63f75549bde2f0cfc51c38d84549cbb5823474aef86b0b0a8c03fe2c9f807000000c691dc1dfb95a67e57286782f7d6af83bed76d364c77aa3a7b829dbc6e6113186b57a7bdbe54b419e81bbf407741000000000000000000"], 0xb6) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f0000000100)) 00:45:39 executing program 1: 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0xc9, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000880)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x404080, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400), 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x9, 0xffffffff, 0x8, 0x402, 0xffffffffffffffff, 0xfca5b28, '\x00', 0x0, r2, 0x2, 0x1, 0x4, 0x1}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000740)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="081816000000000000000000001c0000000000199b78e9df9d32dbf6f6d4468f404d775639", @ANYRES32=r3, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x2, 0x9e, &(0x7f0000000240)=""/158, 0x41100, 0x12, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xd, 0x0, 0x80000001}, 0x10, r4, r1, 0x0, &(0x7f0000000780)=[r5, r6, r7]}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x7) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') setsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x0, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x25}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x28) [ 2739.625530][ T7866] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0xc9, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="03c900b27423c9dbb02c63c14e6f08b49cce83e7f7731c69adad4c029a06a13be999259630c1d6990dc37d62704edcf868d920540ac2326dbb2e52ee26cbc49f2c1fb8789a53203ddf521488933b88b867cb898a07eef44ec44cbcd5f6b63f75549bde2f0cfc51c38d84549cbb5823474aef86b0b0a8c03fe2c9f807000000c691dc1dfb95a67e57286782f7d6af83bed76d364c77aa3a7b829dbc6e6113186b57a7bdbe54b419e81bbf407741000000000000000000"], 0xb6) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f0000000100)) 00:45:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000880)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x404080, 0x0) (async, rerun: 64) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400), 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) (async, rerun: 32) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x9, 0xffffffff, 0x8, 0x402, 0xffffffffffffffff, 0xfca5b28, '\x00', 0x0, r2, 0x2, 0x1, 0x4, 0x1}, 0x48) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000740)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="081816000000000000000000001c0000000000199b78e9df9d32dbf6f6d4468f404d775639", @ANYRES32=r3, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x2, 0x9e, &(0x7f0000000240)=""/158, 0x41100, 0x12, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xd, 0x0, 0x80000001}, 0x10, r4, r1, 0x0, &(0x7f0000000780)=[r5, r6, r7]}, 0x80) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async, rerun: 64) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x7) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') (async) setsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) 00:45:39 executing program 1: 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x25}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x28) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="03c900b27423c9dbb02c63c14e6f08b49cce83e7f7731c69adad4c029a06a13be999259630c1d6990dc37d62704edcf868d920540ac2326dbb2e52ee26cbc49f2c1fb8789a53203ddf521488933b88b867cb898a07eef44ec44cbcd5f6b63f75549bde2f0cfc51c38d84549cbb5823474aef86b0b0a8c03fe2c9f807000000c691dc1dfb95a67e57286782f7d6af83bed76d364c77aa3a7b829dbc6e6113186b57a7bdbe54b419e81bbf407741000000000000000000"], 0xb6) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, &(0x7f0000000100)) [ 2739.673276][ T7866] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x0, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 1: 00:45:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000880)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x404080, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400), 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x9, 0xffffffff, 0x8, 0x402, 0xffffffffffffffff, 0xfca5b28, '\x00', 0x0, r2, 0x2, 0x1, 0x4, 0x1}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000740)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="081816000000000000000000001c0000000000199b78e9df9d32dbf6f6d4468f404d775639", @ANYRES32=r3, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x2, 0x9e, &(0x7f0000000240)=""/158, 0x41100, 0x12, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xd, 0x0, 0x80000001}, 0x10, r4, r1, 0x0, &(0x7f0000000780)=[r5, r6, r7]}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x7) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') setsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000880)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x404080, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400), 0x0, 0x8, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x9, 0xffffffff, 0x8, 0x402, 0xffffffffffffffff, 0xfca5b28, '\x00', 0x0, r2, 0x2, 0x1, 0x4, 0x1}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000740)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="081816000000000000000000001c0000000000199b78e9df9d32dbf6f6d4468f404d775639", @ANYRES32=r3, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x2, 0x9e, &(0x7f0000000240)=""/158, 0x41100, 0x12, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xd, 0x0, 0x80000001}, 0x10, r4, r1, 0x0, &(0x7f0000000780)=[r5, r6, r7]}, 0x80) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x7) (async) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') (async) setsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) (async) 00:45:39 executing program 5: 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x25}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x28) 00:45:39 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000240)=@HCI_EVENT_PKT={0x4, @hci_ev_io_capa_request={{0x31, 0x6}}}, 0x9) ioprio_set$uid(0x3, 0xffffffffffffffff, 0x4007) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000100)={0x2, 0x8}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000800) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000080), 0x20, 0x100) 00:45:39 executing program 5: 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x0, @any, 0x5, "f052d6e2cc", 0x8}, {}]}}}}, 0x3d) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0xb, "5242965ccf40379300b4f8", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x33) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1, @any, 0x0, "", 0x8}, {}]}}}}, 0x38) 00:45:39 executing program 5: 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0xb, "5242965ccf40379300b4f8", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x33) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000240)=@HCI_EVENT_PKT={0x4, @hci_ev_io_capa_request={{0x31, 0x6}}}, 0x9) ioprio_set$uid(0x3, 0xffffffffffffffff, 0x4007) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000100)={0x2, 0x8}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000800) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000080), 0x20, 0x100) 00:45:39 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 2: ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000140)={0x1, 0x0, [{0x7ff, 0x7, 0x7, [0xf3, 0x2, 0x0, 0x7, 0x401, 0x9, 0x2c, 0x4c]}]}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@initdev, 0x0}, &(0x7f00000001c0)=0x14) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x0, 0x400, 0x2, 0x249, r0, 0x100, '\x00', r2, r3, 0x3, 0x0, 0x3}, 0x48) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004300)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x80000001, {0x3, 0xffffffffffffffff, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x5, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000200)={0x290, 0xfffffffffffffff5, 0x0, [{{0x6, 0x2, 0x10001, 0x9, 0x3, 0x5, {0x4, 0x7, 0x1ff, 0x4, 0x4be08ca4, 0xb37, 0x5, 0x0, 0x10001, 0x1000, 0xe8, 0x0, 0x0, 0x3, 0x7f}}, {0x6, 0x6, 0x1, 0xc, '*'}}, {{0x5, 0x2, 0x4, 0x7, 0x800, 0x93a, {0x6, 0x8, 0x3e9, 0x80000001, 0x6, 0x7, 0x9, 0x8, 0x238d3a29, 0x8000, 0x44c5, 0x0, r8, 0xbac2, 0xfffffffc}}, {0x1, 0xffffffff, 0x1, 0x8, '\x00'}}, {{0x1, 0x1, 0xc8, 0x5, 0x3ff, 0x81, {0x6, 0xd42e, 0x101, 0x0, 0xdd, 0x5, 0x100, 0x92b, 0x2, 0x1000, 0x10000, r4, r1, 0x787, 0x8}}, {0x2, 0x6, 0x1, 0x3, '\x00'}}, {{0x3, 0x1, 0x31a, 0x0, 0x9, 0x7, {0x0, 0x0, 0x8000000000000001, 0x3, 0x3e, 0x8, 0x5, 0x7ff, 0x2, 0x2000, 0x420, r4, r1, 0xffffffff, 0x4}}, {0x5, 0x1, 0x1, 0x1, '\x00'}}]}, 0x290) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) getsockopt$inet6_mreq(r9, 0x29, 0x1c, &(0x7f0000000040)={@dev}, &(0x7f0000000100)=0x14) 00:45:39 executing program 5: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 2: ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000140)={0x1, 0x0, [{0x7ff, 0x7, 0x7, [0xf3, 0x2, 0x0, 0x7, 0x401, 0x9, 0x2c, 0x4c]}]}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@initdev, 0x0}, &(0x7f00000001c0)=0x14) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x0, 0x400, 0x2, 0x249, r0, 0x100, '\x00', r2, r3, 0x3, 0x0, 0x3}, 0x48) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004300)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x80000001, {0x3, 0xffffffffffffffff, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x5, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000200)={0x290, 0xfffffffffffffff5, 0x0, [{{0x6, 0x2, 0x10001, 0x9, 0x3, 0x5, {0x4, 0x7, 0x1ff, 0x4, 0x4be08ca4, 0xb37, 0x5, 0x0, 0x10001, 0x1000, 0xe8, 0x0, 0x0, 0x3, 0x7f}}, {0x6, 0x6, 0x1, 0xc, '*'}}, {{0x5, 0x2, 0x4, 0x7, 0x800, 0x93a, {0x6, 0x8, 0x3e9, 0x80000001, 0x6, 0x7, 0x9, 0x8, 0x238d3a29, 0x8000, 0x44c5, 0x0, r8, 0xbac2, 0xfffffffc}}, {0x1, 0xffffffff, 0x1, 0x8, '\x00'}}, {{0x1, 0x1, 0xc8, 0x5, 0x3ff, 0x81, {0x6, 0xd42e, 0x101, 0x0, 0xdd, 0x5, 0x100, 0x92b, 0x2, 0x1000, 0x10000, r4, r1, 0x787, 0x8}}, {0x2, 0x6, 0x1, 0x3, '\x00'}}, {{0x3, 0x1, 0x31a, 0x0, 0x9, 0x7, {0x0, 0x0, 0x8000000000000001, 0x3, 0x3e, 0x8, 0x5, 0x7ff, 0x2, 0x2000, 0x420, r4, r1, 0xffffffff, 0x4}}, {0x5, 0x1, 0x1, 0x1, '\x00'}}]}, 0x290) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) getsockopt$inet6_mreq(r9, 0x29, 0x1c, &(0x7f0000000040)={@dev}, &(0x7f0000000100)=0x14) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000140)={0x1, 0x0, [{0x7ff, 0x7, 0x7, [0xf3, 0x2, 0x0, 0x7, 0x401, 0x9, 0x2c, 0x4c]}]}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@initdev}, &(0x7f00000001c0)=0x14) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x0, 0x400, 0x2, 0x249, r0, 0x100, '\x00', r2, r3, 0x3, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r6, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004300)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x80000001, {0x3, 0xffffffffffffffff, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x5, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000200)={0x290, 0xfffffffffffffff5, 0x0, [{{0x6, 0x2, 0x10001, 0x9, 0x3, 0x5, {0x4, 0x7, 0x1ff, 0x4, 0x4be08ca4, 0xb37, 0x5, 0x0, 0x10001, 0x1000, 0xe8, 0x0, 0x0, 0x3, 0x7f}}, {0x6, 0x6, 0x1, 0xc, '*'}}, {{0x5, 0x2, 0x4, 0x7, 0x800, 0x93a, {0x6, 0x8, 0x3e9, 0x80000001, 0x6, 0x7, 0x9, 0x8, 0x238d3a29, 0x8000, 0x44c5, 0x0, r8, 0xbac2, 0xfffffffc}}, {0x1, 0xffffffff, 0x1, 0x8, '\x00'}}, {{0x1, 0x1, 0xc8, 0x5, 0x3ff, 0x81, {0x6, 0xd42e, 0x101, 0x0, 0xdd, 0x5, 0x100, 0x92b, 0x2, 0x1000, 0x10000, r4, r1, 0x787, 0x8}}, {0x2, 0x6, 0x1, 0x3, '\x00'}}, {{0x3, 0x1, 0x31a, 0x0, 0x9, 0x7, {0x0, 0x0, 0x8000000000000001, 0x3, 0x3e, 0x8, 0x5, 0x7ff, 0x2, 0x2000, 0x420, r4, r1, 0xffffffff, 0x4}}, {0x5, 0x1, 0x1, 0x1, '\x00'}}]}, 0x290) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) (async) getsockopt$inet6_mreq(r9, 0x29, 0x1c, &(0x7f0000000040)={@dev}, &(0x7f0000000100)=0x14) (async) [ 2739.841472][ T23] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 [ 2739.843480][ T23] Bluetooth: hci2: Injecting HCI hardware error event [ 2739.845199][ T7866] Bluetooth: hci2: hardware error 0x00 00:45:39 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926", 0x81}, {0x1, 0x1}, {}]}}}}, 0x38) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x30}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0xb, "5242965ccf40379300b4f8", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x33) 00:45:39 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000240)=@HCI_EVENT_PKT={0x4, @hci_ev_io_capa_request={{0x31, 0x6}}}, 0x9) ioprio_set$uid(0x3, 0xffffffffffffffff, 0x4007) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000100)={0x2, 0x8}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000800) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000080), 0x20, 0x100) 00:45:39 executing program 5: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x10, "5242965ccf40379300b4f8b0b83316e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x38) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x16}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1}, {}]}}}}, 0x19) 00:45:39 executing program 5: syz_emit_vhci(0x0, 0x0) 00:45:39 executing program 2: ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000140)={0x1, 0x0, [{0x7ff, 0x7, 0x7, [0xf3, 0x2, 0x0, 0x7, 0x401, 0x9, 0x2c, 0x4c]}]}) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@initdev, 0x0}, &(0x7f00000001c0)=0x14) (async) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x0, 0x400, 0x2, 0x249, r0, 0x100, '\x00', r2, r3, 0x3, 0x0, 0x3}, 0x48) (async) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004300)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x80000001, {0x3, 0xffffffffffffffff, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x5, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000200)={0x290, 0xfffffffffffffff5, 0x0, [{{0x6, 0x2, 0x10001, 0x9, 0x3, 0x5, {0x4, 0x7, 0x1ff, 0x4, 0x4be08ca4, 0xb37, 0x5, 0x0, 0x10001, 0x1000, 0xe8, 0x0, 0x0, 0x3, 0x7f}}, {0x6, 0x6, 0x1, 0xc, '*'}}, {{0x5, 0x2, 0x4, 0x7, 0x800, 0x93a, {0x6, 0x8, 0x3e9, 0x80000001, 0x6, 0x7, 0x9, 0x8, 0x238d3a29, 0x8000, 0x44c5, 0x0, r8, 0xbac2, 0xfffffffc}}, {0x1, 0xffffffff, 0x1, 0x8, '\x00'}}, {{0x1, 0x1, 0xc8, 0x5, 0x3ff, 0x81, {0x6, 0xd42e, 0x101, 0x0, 0xdd, 0x5, 0x100, 0x92b, 0x2, 0x1000, 0x10000, r4, r1, 0x787, 0x8}}, {0x2, 0x6, 0x1, 0x3, '\x00'}}, {{0x3, 0x1, 0x31a, 0x0, 0x9, 0x7, {0x0, 0x0, 0x8000000000000001, 0x3, 0x3e, 0x8, 0x5, 0x7ff, 0x2, 0x2000, 0x420, r4, r1, 0xffffffff, 0x4}}, {0x5, 0x1, 0x1, 0x1, '\x00'}}]}, 0x290) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) getsockopt$inet6_mreq(r9, 0x29, 0x1c, &(0x7f0000000040)={@dev}, &(0x7f0000000100)=0x14) 00:45:39 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x16}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1}, {}]}}}}, 0x19) 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:39 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x10, "5242965ccf40379300b4f8b0b83316e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x38) 00:45:39 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) [ 2739.962549][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:39 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) [ 2739.998298][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:40 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0xf8, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x16}, @hci_ev_le_advertising_info={{}, {0x2, [{0x1, 0x1}, {}]}}}}, 0x19) 00:45:40 executing program 2: setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000000)=0x3ff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x35}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x10, "5242965ccf40379300b4f8b0b83316e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x38) [ 2740.046460][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0x0, 0x1, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x13, "5242965ccf40379300b4f8b0b83316e32204e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3b) [ 2740.097855][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 2: setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000000)=0x3ff, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xfffffc78}, @hci_ev_le_remote_feat_complete={{}, {0x0, 0x0, "582588fca39df6a4"}}}}, 0xf) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0x0, 0x0, @none, 0x7fff, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x13, "5242965ccf40379300b4f8b0b83316e32204e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3b) 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 2: setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000000)=0x3ff, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x2b}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0xb, "5242965ccf40379300b4f8", 0x81}, {0x1, 0x1}, {}]}}}}, 0x2e) [ 2740.206248][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "000478", 0x1}}}, 0xd) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mq_timedsend(r0, &(0x7f0000000240)="2a1b90d3104f4fc663a5706e7352f2099b9d", 0x12, 0x4, &(0x7f0000000280)={0x77359400}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x1, 0x5}, 0x100, './file0\x00'}) mq_timedreceive(r0, &(0x7f00000002c0)=""/172, 0xac, 0x722, &(0x7f0000000380)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000180)={@initdev}, &(0x7f00000001c0)=0x14) eventfd2(0xa5, 0xb39c9cce3ad48127) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000003c0)={@any, 0x4, 0x4, 0x3f}) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0x0, 0x0, @none, 0x0, 0x0, 0x2, 0x6}}}}, 0x16) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x21}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x1, 'R', 0x81}, {0x1, 0x1}, {}]}}}}, 0x24) 00:45:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@any, 0x80, 0x4, 0x3}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) socket$bt_cmtp(0x1f, 0x3, 0x5) 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) [ 2740.258314][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "000478", 0x1}}}, 0xd) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mq_timedsend(r0, &(0x7f0000000240)="2a1b90d3104f4fc663a5706e7352f2099b9d", 0x12, 0x4, &(0x7f0000000280)={0x77359400}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x1, 0x5}, 0x100, './file0\x00'}) mq_timedreceive(r0, &(0x7f00000002c0)=""/172, 0xac, 0x722, &(0x7f0000000380)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000180)={@initdev}, &(0x7f00000001c0)=0x14) eventfd2(0xa5, 0xb39c9cce3ad48127) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000003c0)={@any, 0x4, 0x4, 0x3f}) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0x0, 0x0, @none, 0x0, 0x0, 0x0, 0x6}}}}, 0x16) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x38}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x13, "5242965ccf40379300b4f8b0b83316e32204e3", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3b) [ 2740.292028][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x13}, @hci_ev_le_conn_complete={{}, {0x0, 0x0, 0x0, 0x0, @none}}}}, 0x16) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "000478", 0x1}}}, 0xd) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mq_timedsend(r0, &(0x7f0000000240)="2a1b90d3104f4fc663a5706e7352f2099b9d", 0x12, 0x4, &(0x7f0000000280)={0x77359400}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x1, 0x5}, 0x100, './file0\x00'}) mq_timedreceive(r0, &(0x7f00000002c0)=""/172, 0xac, 0x722, &(0x7f0000000380)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000180)={@initdev}, &(0x7f00000001c0)=0x14) eventfd2(0xa5, 0xb39c9cce3ad48127) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f00000003c0)={@any, 0x4, 0x4, 0x3f}) 00:45:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@any, 0x80, 0x4, 0x3}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) socket$bt_cmtp(0x1f, 0x3, 0x5) [ 2740.345333][ T675] Bluetooth: hci3: Ignoring HCI_Connection_Complete for existing connection 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x14, "5242965ccf40379300b4f8b0b83316e32204e3c9", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3c) 00:45:40 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043eef00000004000000fc00007795"], 0x63) 00:45:40 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@any, 0x80, 0x4, 0x3}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) socket$bt_cmtp(0x1f, 0x3, 0x5) 00:45:40 executing program 4: eventfd2(0x4, 0x800) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_hardware_error={{0x10, 0x1}, {0xe6}}}, 0x4) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x20}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x0, "", 0x81}, {0x1, 0x1}, {}]}}}}, 0x23) 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x14, "5242965ccf40379300b4f8b0b83316e32204e3c9", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3c) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0xf2a, 0x99, 0x3, 0xa1, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x21}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x1, 'R'}, {0x1, 0x1}, {}]}}}}, 0x24) 00:45:40 executing program 1: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x39}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x14, "5242965ccf40379300b4f8b0b83316e32204e3c9", 0x81}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3c) 00:45:40 executing program 4: eventfd2(0x4, 0x800) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_hardware_error={{0x10, 0x1}, {0xe6}}}, 0x4) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0xf2a, 0x99, 0x3, 0xa1, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) 00:45:40 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926"}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3d) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 4: eventfd2(0x4, 0x800) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_hardware_error={{0x10, 0x1}, {0xe6}}}, 0x4) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0xf2a, 0x99, 0x3, 0xa1, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0xf2a, 0x99, 0x3, 0xa1, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) (async) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926"}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3d) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000080)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}, {0xc8}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) socketpair(0xf, 0x1, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x40, 0x7fe0, 0x1, 0xff, {{0xe, 0x4, 0x2, 0x21, 0x38, 0x67, 0x0, 0xff, 0x3e, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @ssrr={0x89, 0x17, 0xd5, [@empty, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @rr={0x7, 0x7, 0x56, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'ip_vti0\x00', r1, 0x10, 0x80, 0x9, 0x2b, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@noop]}}}}}) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x3a}, @hci_ev_le_advertising_info={{}, {0x3, [{0x0, 0x0, @any, 0x15, "5242965ccf40379300b4f8b0b83316e32204e3c926"}, {0x1, 0x1, @any, 0x5, "f052d6e2cc", 0x8}, {0x1}]}}}}, 0x3d) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000080)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}, {0xc8}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 00:45:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) socketpair(0xf, 0x1, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x40, 0x7fe0, 0x1, 0xff, {{0xe, 0x4, 0x2, 0x21, 0x38, 0x67, 0x0, 0xff, 0x3e, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @ssrr={0x89, 0x17, 0xd5, [@empty, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @rr={0x7, 0x7, 0x56, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'ip_vti0\x00', r1, 0x10, 0x80, 0x9, 0x2b, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@noop]}}}}}) 00:45:40 executing program 1: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xffffffffffffffff) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000000)={0x2, 0x4}) ioctl$SIOCNRDECOBS(r0, 0x89e2) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, r2}, 0x18) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="e9c750041f43fcda62693f179ed1e80000000100d8705c9eef4ab0c3a177ffffffffffff35c2492adf7bc12001bcbe230b9753c009d272f47299f303b2b687bc71904ee263d9e22fa7f82da7e499"], 0x9) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000080)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}, {0xc8}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 00:45:40 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) socketpair(0xf, 0x1, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x40, 0x7fe0, 0x1, 0xff, {{0xe, 0x4, 0x2, 0x21, 0x38, 0x67, 0x0, 0xff, 0x3e, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @ssrr={0x89, 0x17, 0xd5, [@empty, @loopback, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @rr={0x7, 0x7, 0x56, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'ip_vti0\x00', r1, 0x10, 0x80, 0x9, 0x2b, {{0x6, 0x4, 0x2, 0x3, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@noop]}}}}}) 00:45:40 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xffffffffffffffff) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000000)={0x2, 0x4}) ioctl$SIOCNRDECOBS(r0, 0x89e2) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, r2}, 0x18) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc8, 0x8000}, {0xc8, 0x12}]}}}, 0xc) 00:45:40 executing program 0: socket$unix(0x1, 0x5, 0x0) 00:45:40 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = geteuid() r2 = getegid() r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004140)={0x3c0, 0x0, 0x0, [{{0x4, 0x0, 0x5, 0x5, 0x1, 0x8, {0x1, 0x101, 0x6, 0xd4, 0x6, 0x74ad, 0x8, 0xd217, 0x9, 0x4000, 0x7f, r1, 0x0, 0x3, 0x1}}, {0x5, 0x8, 0x3, 0x1, '}%-'}}, {{0x4, 0x3, 0x4, 0x6, 0x6, 0x0, {0x4, 0x8, 0x4, 0x7, 0x80000001, 0x4df3, 0x4, 0x80000001, 0x80000000, 0x2000, 0x7, 0xffffffffffffffff, r2, 0x7fffffff, 0xbf18}}, {0x3, 0x7f, 0x6, 0x1, '^\x06]!\\('}}, {{0x0, 0x3, 0x80000000, 0x0, 0xfffffffb, 0x7fffffff, {0x5, 0x2, 0x0, 0x3, 0x6, 0x2, 0x3ff, 0x3, 0x6, 0x6000, 0x8, 0xffffffffffffffff, r7, 0x7fff, 0x4ab5}}, {0x1, 0x9, 0x0, 0x3}}, {{0x0, 0x3, 0xb0, 0x1, 0x6, 0x4, {0x4, 0x1f, 0xff, 0x3f, 0x8, 0xe314, 0x7, 0x5, 0x9, 0x1000, 0x99, r8, 0xee00, 0x8000, 0x5}}, {0x2, 0x1, 0x0, 0x80}}, {{0x4, 0x3, 0x401, 0x9, 0x1, 0x200, {0x4, 0xffffffff, 0x9d, 0x6, 0x5, 0x0, 0xd2d, 0x3, 0x7, 0xa000, 0x3, r9, 0xee00, 0x101, 0x7}}, {0x0, 0x400, 0x2, 0xffffffff, '+\\'}}, {{0x5, 0x0, 0x3, 0x22d, 0x1, 0x7, {0x1, 0x1800, 0x0, 0x8, 0x3ff, 0x8, 0x3, 0x5, 0x100, 0x8000, 0x3, r10, 0x0, 0x7}}, {0x1, 0x9, 0x8, 0x3f, ']/)\')+\xf0\''}}]}, 0x3c0) syz_emit_vhci(&(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x10}, @l2cap_cid_le_signaling={{0xc}, @l2cap_ecred_reconf_req={{0x19, 0x1, 0x8}, {0x5, 0xfffa, [0x1, 0x3ff]}}}}, 0x15) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2740.800981][ T3062] Bluetooth: hci3: Opcode 0x c03 failed: -110 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc8, 0x8000}, {0xc8, 0x12}]}}}, 0xc) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0xffffffffffffffff) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000000)={0x2, 0x4}) ioctl$SIOCNRDECOBS(r0, 0x89e2) syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, r2}, 0x18) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = geteuid() r2 = getegid() r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004140)={0x3c0, 0x0, 0x0, [{{0x4, 0x0, 0x5, 0x5, 0x1, 0x8, {0x1, 0x101, 0x6, 0xd4, 0x6, 0x74ad, 0x8, 0xd217, 0x9, 0x4000, 0x7f, r1, 0x0, 0x3, 0x1}}, {0x5, 0x8, 0x3, 0x1, '}%-'}}, {{0x4, 0x3, 0x4, 0x6, 0x6, 0x0, {0x4, 0x8, 0x4, 0x7, 0x80000001, 0x4df3, 0x4, 0x80000001, 0x80000000, 0x2000, 0x7, 0xffffffffffffffff, r2, 0x7fffffff, 0xbf18}}, {0x3, 0x7f, 0x6, 0x1, '^\x06]!\\('}}, {{0x0, 0x3, 0x80000000, 0x0, 0xfffffffb, 0x7fffffff, {0x5, 0x2, 0x0, 0x3, 0x6, 0x2, 0x3ff, 0x3, 0x6, 0x6000, 0x8, 0xffffffffffffffff, r7, 0x7fff, 0x4ab5}}, {0x1, 0x9, 0x0, 0x3}}, {{0x0, 0x3, 0xb0, 0x1, 0x6, 0x4, {0x4, 0x1f, 0xff, 0x3f, 0x8, 0xe314, 0x7, 0x5, 0x9, 0x1000, 0x99, r8, 0xee00, 0x8000, 0x5}}, {0x2, 0x1, 0x0, 0x80}}, {{0x4, 0x3, 0x401, 0x9, 0x1, 0x200, {0x4, 0xffffffff, 0x9d, 0x6, 0x5, 0x0, 0xd2d, 0x3, 0x7, 0xa000, 0x3, r9, 0xee00, 0x101, 0x7}}, {0x0, 0x400, 0x2, 0xffffffff, '+\\'}}, {{0x5, 0x0, 0x3, 0x22d, 0x1, 0x7, {0x1, 0x1800, 0x0, 0x8, 0x3ff, 0x8, 0x3, 0x5, 0x100, 0x8000, 0x3, r10, 0x0, 0x7}}, {0x1, 0x9, 0x8, 0x3f, ']/)\')+\xf0\''}}]}, 0x3c0) syz_emit_vhci(&(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x10}, @l2cap_cid_le_signaling={{0xc}, @l2cap_ecred_reconf_req={{0x19, 0x1, 0x8}, {0x5, 0xfffa, [0x1, 0x3ff]}}}}, 0x15) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}}}, 0x4) 00:45:40 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_num_comp_pkts={{0x13, 0x9}, {0x2, [{0xc8, 0x8000}, {0xc8, 0x12}]}}}, 0xc) 00:45:40 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = geteuid() r2 = getegid() r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004140)={0x3c0, 0x0, 0x0, [{{0x4, 0x0, 0x5, 0x5, 0x1, 0x8, {0x1, 0x101, 0x6, 0xd4, 0x6, 0x74ad, 0x8, 0xd217, 0x9, 0x4000, 0x7f, r1, 0x0, 0x3, 0x1}}, {0x5, 0x8, 0x3, 0x1, '}%-'}}, {{0x4, 0x3, 0x4, 0x6, 0x6, 0x0, {0x4, 0x8, 0x4, 0x7, 0x80000001, 0x4df3, 0x4, 0x80000001, 0x80000000, 0x2000, 0x7, 0xffffffffffffffff, r2, 0x7fffffff, 0xbf18}}, {0x3, 0x7f, 0x6, 0x1, '^\x06]!\\('}}, {{0x0, 0x3, 0x80000000, 0x0, 0xfffffffb, 0x7fffffff, {0x5, 0x2, 0x0, 0x3, 0x6, 0x2, 0x3ff, 0x3, 0x6, 0x6000, 0x8, 0xffffffffffffffff, r7, 0x7fff, 0x4ab5}}, {0x1, 0x9, 0x0, 0x3}}, {{0x0, 0x3, 0xb0, 0x1, 0x6, 0x4, {0x4, 0x1f, 0xff, 0x3f, 0x8, 0xe314, 0x7, 0x5, 0x9, 0x1000, 0x99, r8, 0xee00, 0x8000, 0x5}}, {0x2, 0x1, 0x0, 0x80}}, {{0x4, 0x3, 0x401, 0x9, 0x1, 0x200, {0x4, 0xffffffff, 0x9d, 0x6, 0x5, 0x0, 0xd2d, 0x3, 0x7, 0xa000, 0x3, r9, 0xee00, 0x101, 0x7}}, {0x0, 0x400, 0x2, 0xffffffff, '+\\'}}, {{0x5, 0x0, 0x3, 0x22d, 0x1, 0x7, {0x1, 0x1800, 0x0, 0x8, 0x3ff, 0x8, 0x3, 0x5, 0x100, 0x8000, 0x3, r10, 0x0, 0x7}}, {0x1, 0x9, 0x8, 0x3f, ']/)\')+\xf0\''}}]}, 0x3c0) syz_emit_vhci(&(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x10}, @l2cap_cid_le_signaling={{0xc}, @l2cap_ecred_reconf_req={{0x19, 0x1, 0x8}, {0x5, 0xfffa, [0x1, 0x3ff]}}}}, 0x15) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043e4d05c8000000007856f15fcb860fce2e453ceb000000000100007c052eea738ade3f439b0af89f771caa4ce830f4e7b2b1575f78b6269945c63379451a"], 0x10) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @multicast, 'syz_tun\x00'}}) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}}}, 0x4) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043e4d05c8000000007856f15fcb860fce2e453ceb000000000100007c052eea738ade3f439b0af89f771caa4ce830f4e7b2b1575f78b6269945c63379451a"], 0x10) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @multicast, 'syz_tun\x00'}}) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240), 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) r6 = eventfd2(0x9, 0x80000) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000000)=r6, 0x1) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DISCONNECT(r5, 0xab08) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000fbffffffe88d4473fa9c06008416f207c6ceb910e718f63be711caf0d1b17a08b36c6c08f25a677aa894edbe856cd688738baa2d5acea6fa2f69f4d528569530892555b563a5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x8d, &(0x7f0000000100)=""/141, 0x60780, 0x12, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x9, 0xffff07c5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[r1, r2, r3, r0, 0xffffffffffffffff, r4]}, 0x80) 00:45:40 executing program 0: syz_emit_vhci(0x0, 0x0) 00:45:40 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = geteuid() r2 = getegid() r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004140)={0x3c0, 0x0, 0x0, [{{0x4, 0x0, 0x5, 0x5, 0x1, 0x8, {0x1, 0x101, 0x6, 0xd4, 0x6, 0x74ad, 0x8, 0xd217, 0x9, 0x4000, 0x7f, r1, 0x0, 0x3, 0x1}}, {0x5, 0x8, 0x3, 0x1, '}%-'}}, {{0x4, 0x3, 0x4, 0x6, 0x6, 0x0, {0x4, 0x8, 0x4, 0x7, 0x80000001, 0x4df3, 0x4, 0x80000001, 0x80000000, 0x2000, 0x7, 0xffffffffffffffff, r2, 0x7fffffff, 0xbf18}}, {0x3, 0x7f, 0x6, 0x1, '^\x06]!\\('}}, {{0x0, 0x3, 0x80000000, 0x0, 0xfffffffb, 0x7fffffff, {0x5, 0x2, 0x0, 0x3, 0x6, 0x2, 0x3ff, 0x3, 0x6, 0x6000, 0x8, 0xffffffffffffffff, r7, 0x7fff, 0x4ab5}}, {0x1, 0x9, 0x0, 0x3}}, {{0x0, 0x3, 0xb0, 0x1, 0x6, 0x4, {0x4, 0x1f, 0xff, 0x3f, 0x8, 0xe314, 0x7, 0x5, 0x9, 0x1000, 0x99, r8, 0xee00, 0x8000, 0x5}}, {0x2, 0x1, 0x0, 0x80}}, {{0x4, 0x3, 0x401, 0x9, 0x1, 0x200, {0x4, 0xffffffff, 0x9d, 0x6, 0x5, 0x0, 0xd2d, 0x3, 0x7, 0xa000, 0x3, r9, 0xee00, 0x101, 0x7}}, {0x0, 0x400, 0x2, 0xffffffff, '+\\'}}, {{0x5, 0x0, 0x3, 0x22d, 0x1, 0x7, {0x1, 0x1800, 0x0, 0x8, 0x3ff, 0x8, 0x3, 0x5, 0x100, 0x8000, 0x3, r10, 0x0, 0x7}}, {0x1, 0x9, 0x8, 0x3f, ']/)\')+\xf0\''}}]}, 0x3c0) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240), 0x200002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) (async) r6 = eventfd2(0x9, 0x80000) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000000)=r6, 0x1) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_DISCONNECT(r5, 0xab08) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000fbffffffe88d4473fa9c06008416f207c6ceb910e718f63be711caf0d1b17a08b36c6c08f25a677aa894edbe856cd688738baa2d5acea6fa2f69f4d528569530892555b563a5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x8d, &(0x7f0000000100)=""/141, 0x60780, 0x12, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x9, 0xffff07c5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[r1, r2, r3, r0, 0xffffffffffffffff, r4]}, 0x80) 00:45:40 executing program 3: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_channel_selected={{0x41, 0x1}}}, 0x4) 00:45:40 executing program 0: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed, "6383242827eedb49"}}}, 0x11) 00:45:40 executing program 4: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043e4d05c8000000007856f15fcb860fce2e453ceb000000000100007c052eea738ade3f439b0af89f771caa4ce830f4e7b2b1575f78b6269945c63379451a"], 0x10) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x3, @multicast, 'syz_tun\x00'}}) 00:45:40 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000300)=0x9c3, &(0x7f0000000580)=0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DISCONNECT(r1, 0xab08) 00:45:40 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240), 0x200002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) (async) r6 = eventfd2(0x9, 0x80000) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000000)=r6, 0x1) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_DISCONNECT(r5, 0xab08) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000fbffffffe88d4473fa9c06008416f207c6ceb910e718f63be711caf0d1b17a08b36c6c08f25a677aa894edbe856cd688738baa2d5acea6fa2f69f4d528569530892555b563a5"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x8d, &(0x7f0000000100)=""/141, 0x60780, 0x12, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x3, 0x9, 0xffff07c5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[r1, r2, r3, r0, 0xffffffffffffffff, r4]}, 0x80) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0xd}, @hci_ev_le_ltk_req={{}, {0xc8}}}}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "0b98ede2419e4d48744cb18c42caa74f3ee34ad07c35344da59d090191a47505980e55f079776c6d86c9ca215810de267e5b579db2b208d5374ad1aa05adf576", 0x28}, 0x48, 0xfffffffffffffffb) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004500)={0x2020}, 0x2020) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_device={{0x1, 0x4}, {0x8, 0x2}}}, 0x7) syz_open_dev$tty1(0xc, 0x4, 0x4) 00:45:41 executing program 2: prctl$PR_GET_IO_FLUSHER(0x3a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000300)=0x9c3, &(0x7f0000000580)=0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DISCONNECT(r1, 0xab08) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) geteuid() 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_device={{0x1, 0x4}, {0x8, 0x2}}}, 0x7) syz_open_dev$tty1(0xc, 0x4, 0x4) 00:45:41 executing program 2: prctl$PR_GET_IO_FLUSHER(0x3a) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="050830100000000100"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0x1, 0x22}, "4e09f50bb668954af51477d84fcf527e8d1e274fd23d7ecc69140ffef2bb65f9f670"}, 0x26) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2741.118941][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 8 [ 2741.122282][ T675] bt_err_ratelimited: 58 callbacks suppressed 00:45:41 executing program 2: prctl$PR_GET_IO_FLUSHER(0x3a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_si_device={{0x1, 0x4}, {0x8, 0x2}}}, 0x7) syz_open_dev$tty1(0xc, 0x4, 0x4) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000300)=0x9c3, &(0x7f0000000580)=0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DISCONNECT(r1, 0xab08) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="050830100000000100"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0x1, 0x22}, "4e09f50bb668954af51477d84fcf527e8d1e274fd23d7ecc69140ffef2bb65f9f670"}, 0x26) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2741.122290][ T675] Bluetooth: hci4: SCO packet for unknown connection handle 1 [ 2741.147710][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 8 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="050830100000000100"], 0x9) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0x1, 0x22}, "4e09f50bb668954af51477d84fcf527e8d1e274fd23d7ecc69140ffef2bb65f9f670"}, 0x26) [ 2741.151479][ T675] Bluetooth: hci4: SCO packet for unknown connection handle 1 [ 2741.178973][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 8 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) membarrier(0x10, 0x0) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="050830100000000100"], 0x9) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) 00:45:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x20, 0xfffffffe, 0x2, 0x102bddb, 0x1015, r1, 0x3, '\x00', 0x0, r2, 0x5, 0x5}, 0x48) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000300)=0x9c3, &(0x7f0000000580)=0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) [ 2741.193287][ T675] Bluetooth: hci4: SCO packet for unknown connection handle 1 [ 2741.257637][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 8 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) membarrier(0x10, 0x0) [ 2741.283070][ T3126] Bluetooth: hci4: command 0x201b tx timeout 00:45:41 executing program 0: syz_emit_vhci(0x0, 0x9) 00:45:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x20, 0xfffffffe, 0x2, 0x102bddb, 0x1015, r1, 0x3, '\x00', 0x0, r2, 0x5, 0x5}, 0x48) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r2, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) getegid() 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000300)=0x9c3, &(0x7f0000000580)=0x4) 00:45:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x20, 0xfffffffe, 0x2, 0x102bddb, 0x1015, r1, 0x3, '\x00', 0x0, r2, 0x5, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x20, 0xfffffffe, 0x2, 0x102bddb, 0x1015, r1, 0x3, '\x00', 0x0, r2, 0x5, 0x5}, 0x48) (async) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_conn_request={{0x4, 0xa}, {@any, "68b378", 0x1}}}, 0xd) membarrier(0x10, 0x0) 00:45:41 executing program 0: syz_emit_vhci(0x0, 0x9) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x180) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x6) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r2, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x180) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x6) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f00000043c0), 0x4) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) 00:45:41 executing program 0: syz_emit_vhci(0x0, 0x9) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x180) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x6) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x9) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) 00:45:41 executing program 5: ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000003c0), 0xbb, 0x121043) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7f, 0x401, 0x1, 0x208, 0xffffffffffffffff, 0x4, '\x00', r0, r1, 0x1, 0x0, 0x0, 0x2}, 0x48) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x0, 0x4}}, 0x9) 00:45:41 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) r1 = syz_open_dev$vcsa(&(0x7f00000003c0), 0xbb, 0x121043) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7f, 0x401, 0x1, 0x208, 0xffffffffffffffff, 0x4, '\x00', r0, r1, 0x1, 0x0, 0x0, 0x2}, 0x48) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x9) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) 00:45:41 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000003c0), 0xbb, 0x121043) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7f, 0x401, 0x1, 0x208, 0xffffffffffffffff, 0x4, '\x00', r0, r1, 0x1, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) syz_open_dev$vcsa(&(0x7f00000003c0), 0xbb, 0x121043) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7f, 0x401, 0x1, 0x208, 0xffffffffffffffff, 0x4, '\x00', r0, r1, 0x1, 0x0, 0x0, 0x2}, 0x48) (async) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0404f8ffffffffffff67b37801"], 0xd) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) 00:45:41 executing program 5: ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x9) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0404f8ffffffffffff67b37801"], 0xd) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 00:45:41 executing program 2: connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x1, 0x1, 0x7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 5: ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0404f8ffffffffffff67b37801"], 0xd) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 2: connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x1, 0x1, 0x7}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 5: r0 = fsopen(0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x68}, "effd07b417a659b2c84819e57d4bde9aef94d3dfadf7e13be7c2f7df7fe974d1651b4edb35d9216e284341efc831bac023335637bde43abd94a05c72babb65c3bcac1e20f2467ede65488e052203175b46827a9074a3545f7d9e6e846690e3dc637eac0101ec59be"}, 0x6c) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xd, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x5, &(0x7f0000000100)=[{0x9, 0x6, 0x5, 0x7fffffff}, {0x9e, 0x0, 0x7, 0x3}, {0x3b6e, 0x6, 0x3, 0x6}, {0x5, 0x80, 0x3, 0x63}, {0x1, 0x20, 0x6, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r1, 0xb9, 0x7fffffff}) 00:45:41 executing program 2: connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x1, 0x1, 0x7}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 5: r0 = fsopen(0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0508301000"], 0x9) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x68}, "effd07b417a659b2c84819e57d4bde9aef94d3dfadf7e13be7c2f7df7fe974d1651b4edb35d9216e284341efc831bac023335637bde43abd94a05c72babb65c3bcac1e20f2467ede65488e052203175b46827a9074a3545f7d9e6e846690e3dc637eac0101ec59be"}, 0x6c) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xd, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x5, &(0x7f0000000100)=[{0x9, 0x6, 0x5, 0x7fffffff}, {0x9e, 0x0, 0x7, 0x3}, {0x3b6e, 0x6, 0x3, 0x6}, {0x5, 0x80, 0x3, 0x63}, {0x1, 0x20, 0x6, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r1, 0xb9, 0x7fffffff}) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) [ 2741.756369][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 8 00:45:41 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) mq_notify(r2, &(0x7f0000000180)={0x0, 0x0, 0x2, @tid=r3}) 00:45:41 executing program 5: r0 = fsopen(0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x9) 00:45:41 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) mq_notify(r2, &(0x7f0000000180)={0x0, 0x0, 0x2, @tid=r3}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) mq_notify(r2, &(0x7f0000000180)={0x0, 0x0, 0x2, @tid=r3}) (async) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="02c920"], 0x42) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x68}, "effd07b417a659b2c84819e57d4bde9aef94d3dfadf7e13be7c2f7df7fe974d1651b4edb35d9216e284341efc831bac023335637bde43abd94a05c72babb65c3bcac1e20f2467ede65488e052203175b46827a9074a3545f7d9e6e846690e3dc637eac0101ec59be"}, 0x6c) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xd, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x5, &(0x7f0000000100)=[{0x9, 0x6, 0x5, 0x7fffffff}, {0x9e, 0x0, 0x7, 0x3}, {0x3b6e, 0x6, 0x3, 0x6}, {0x5, 0x80, 0x3, 0x63}, {0x1, 0x20, 0x6, 0x9}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r1, 0xb9, 0x7fffffff}) [ 2741.819080][ T675] Bluetooth: hci4: ISO packet for unknown connection handle 0 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() getegid() keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) mq_notify(r2, &(0x7f0000000180)={0x0, 0x0, 0x2, @tid=r3}) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x2, &(0x7f0000000000)=[{0x7f, 0x1, 0x3, 0x8001}, {0xfffa, 0x1, 0x1, 0x2}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0508301000"], 0x9) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) geteuid() keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0508301000"], 0x9) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x8000000, 0x0, 0x0, 0x85, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 0: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB], 0x9) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x8000000, 0x0, 0x0, 0x85, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:41 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0508301000"], 0x9) 00:45:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="49d6bdb633958220903df897e381b6ce70de64e1e55a97dc911cbc7aa2244234cb0000000000000000d4f2ec3009846e4efb743be7994520a8de8aebb4fc5682bfcd79dc65263ee518406090bf118b998ff446e71b6eb8a8068790059da9d58a42fc24a42d73693b126627a4a61eca0ee9a900ee2a80164e9dea63c43adaa9908466132af1e4f0e5adbb40300ba22f956db4912b5dad7e11104887ad08d619789b"], 0xd) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x8000000, 0x0, 0x0, 0x85, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:41 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2742.001189][ T7866] Bluetooth: hci2: Opcode 0x c03 failed: -110 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x11}, @hci_ev_le_direct_adv_info={{}, {0x9, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5, @none, 0x80}}}}, 0x14) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) [ 2742.037375][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x10000}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x6, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdd00, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000100)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x10000, 0x1}, 0x10, r3}, 0x80) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x10000}}, './file0\x00'}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x6, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdd00, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000100)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x10000, 0x1}, 0x10, r3}, 0x80) 00:45:42 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x11}, @hci_ev_le_direct_adv_info={{}, {0x9, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5, @none, 0x80}}}}, 0x14) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2742.115498][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_le_meta={{0x3e, 0x11}, @hci_ev_le_direct_adv_info={{}, {0x9, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5, @none, 0x80}}}}, 0x14) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x10000}}, './file0\x00'}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x6, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdd00, 0x0, 0x0, 0x0, 0xffff}], &(0x7f0000000100)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x10000, 0x1}, 0x10, r3}, 0x80) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_disconn_logical_link_complete={{0x46, 0x4}, {0x0, 0xc8, 0x3f}}}, 0x7) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0xf}, {0x1, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4, 0x3, 0x3f, "540ebb", 0x4}]}}}, 0x12) 00:45:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_disconn_logical_link_complete={{0x46, 0x4}, {0x0, 0xc8, 0x3f}}}, 0x7) [ 2742.202686][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_disconn_logical_link_complete={{0x46, 0x4}, {0x0, 0xc8, 0x3f}}}, 0x7) 00:45:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x33, @any, 0x2}}}, 0xb) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0xf}, {0x1, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4, 0x3, 0x3f, "540ebb", 0x4}]}}}, 0x12) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x33, @any, 0x2}}}, 0xb) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 00:45:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000100)=""/200, 0xc8) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @broadcast, 'veth0_vlan\x00'}}, 0x1e) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0xf}, {0x1, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4, 0x3, 0x3f, "540ebb", 0x4}]}}}, 0x12) 00:45:42 executing program 1: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x33, @any, 0x2}}}, 0xb) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000100)=""/200, 0xc8) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @broadcast, 'veth0_vlan\x00'}}, 0x1e) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) fsopen(&(0x7f0000000040)='nsfs\x00', 0x0) 00:45:42 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x1, 0x2, 0x7}, 0x10) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="02c830e5dfffff0100"], 0x9) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000100)=""/200, 0xc8) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @broadcast, 'veth0_vlan\x00'}}, 0x1e) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x1, 0x2, 0x7}, 0x10) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="02c830e5dfffff0100"], 0x9) [ 2742.467253][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) fsopen(&(0x7f0000000040)='nsfs\x00', 0x0) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2742.526016][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) connect$nfc_raw(r0, &(0x7f0000000040)={0x27, 0x1, 0x2, 0x7}, 0x10) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="02c830e5dfffff0100"], 0x9) [ 2742.561796][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r3, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r5, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r6 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r3, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r4, r6, 0xfe, 0xfffffff7}}}, 0x78) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r7, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r8, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r10, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r11 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r8, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r9, r11, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="60040000f5ffffff", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000002000000000000000400000000000000050000000400000006000000000000000400000000000000010100000000000006000000000000003f00000000000000090000000000000009000000c4ffffffffff00000010000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="ff030000070000000000000004000000000000004000000000000000000000007a000000040000000000000001000000000000003f00000000000000020000000000000000000000020000000300000000000000ffffffffffffff7fb100000000000000e30000000000000070ffffffffffffff03000000000000000100008004000000bb0000000080000007000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="9a0000000700000000000000010000000000000001000000000000000100000001000000000000000000000001000000000000000200000000000000040000000000000000400500000000000200000005000000030000000000000000000000000000000100000000000080ffff0000000000000001000000000000e1080000000000000600000001800000341e42950010000009000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0600000001040000000000000600000000000000020000000000000001000000050000000000000000000000010000000000000003000000000000000004000000000000010000000000000079cd00004000000000000000000000000600000000000000000001000000000004000000000000005ff70000000000000200000000000000ff000000001800000500000000a0000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01010000ed35000000000000060000000000000000100000000000000500000004000000292e842d5c0000000400000000000000020000000000000000000100000000000700000000000000ff0700000800000005000000000000002a0e000000000000ff7f000000000000030000000000000000f8ffffffffffff05000000000000000100000010610000000100000020000005000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="01000000d80000000000000001000000000000000600000000000000000000000100000005000000000000000000000000000000010400000000000001000080000000000600000002000000030000000000000000000000001800000200000000000000050000000000000005000000000000002891000000000000f10b000080000000080000000080000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYBLOB="3900000000100000000000000600000000000000fb0f00000000000001000000cbc600"/44], 0x460) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7f, 0xfffffcfb, 0x5, 0x0, r0, 0x7f, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0xc}, 0x48) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2742.614090][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r3, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r5, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r6 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r3, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r4, r6, 0xfe, 0xfffffff7}}}, 0x78) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r7, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r8, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r10, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r11 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r8, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r9, r11, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="60040000f5ffffff", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000002000000000000000400000000000000050000000400000006000000000000000400000000000000010100000000000006000000000000003f00000000000000090000000000000009000000c4ffffffffff00000010000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="ff030000070000000000000004000000000000004000000000000000000000007a000000040000000000000001000000000000003f00000000000000020000000000000000000000020000000300000000000000ffffffffffffff7fb100000000000000e30000000000000070ffffffffffffff03000000000000000100008004000000bb0000000080000007000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="9a0000000700000000000000010000000000000001000000000000000100000001000000000000000000000001000000000000000200000000000000040000000000000000400500000000000200000005000000030000000000000000000000000000000100000000000080ffff0000000000000001000000000000e1080000000000000600000001800000341e42950010000009000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0600000001040000000000000600000000000000020000000000000001000000050000000000000000000000010000000000000003000000000000000004000000000000010000000000000079cd00004000000000000000000000000600000000000000000001000000000004000000000000005ff70000000000000200000000000000ff000000001800000500000000a0000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01010000ed35000000000000060000000000000000100000000000000500000004000000292e842d5c0000000400000000000000020000000000000000000100000000000700000000000000ff0700000800000005000000000000002a0e000000000000ff7f000000000000030000000000000000f8ffffffffffff05000000000000000100000010610000000100000020000005000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="06000000020000000000000001000000000000000100000000000000010000000000010000000000000000000600000088f4e2000000000300000000000000020000000000000000080000000000000600000000000000060000000000000001000000000000000200068d59dfba291529dbcb0bb8fe95fa00000000000006000000000000000800000000000000050000000000000003000000800000000300000000000000dad3000068f08cb582c6ebd8ecd13f02ae397d7c8aaf95cceee6af48f3c08d0ba742be9c5a96fb58bcf513d316d51bc01cd2843cf60de805ec18c2da8a69ecda227425b5ce73559c4bc26e0aaa21334329c1864db6b84695c81dac3edba728480599708ebc0e86e640cd4f69c3e0f6e011051e1cde2bf5ed110e587bc14db60e16d3b92adca29806a01b7cb422b2de640ed73a67d9eb718bf61ed8283db2c0e2d8ac7cd412019ce12157801f6b", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="01000000d80000000000000001000000000000000600000000000000000000000100000005000000000000000000000000000000010400000000000001000080000000000600000002000000030000000000000000000000001800000200000000000000050000000000000005000000000000002891000000000000f10b000080000000080000000080000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYBLOB="3900000000100000000000000600000000000000fb0f00000000000001000000cbc600"/44], 0x460) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7f, 0xfffffcfb, 0x5, 0x0, r0, 0x7f, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0xc}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r3, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r5, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r3, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r4, r6, 0xfe, 0xfffffff7}}}, 0x78) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r7, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r8, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r10, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r8, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r9, r11, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="60040000f5ffffff", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000002000000000000000400000000000000050000000400000006000000000000000400000000000000010100000000000006000000000000003f00000000000000090000000000000009000000c4ffffffffff00000010000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="ff030000070000000000000004000000000000004000000000000000000000007a000000040000000000000001000000000000003f00000000000000020000000000000000000000020000000300000000000000ffffffffffffff7fb100000000000000e30000000000000070ffffffffffffff03000000000000000100008004000000bb0000000080000007000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="9a0000000700000000000000010000000000000001000000000000000100000001000000000000000000000001000000000000000200000000000000040000000000000000400500000000000200000005000000030000000000000000000000000000000100000000000080ffff0000000000000001000000000000e1080000000000000600000001800000341e42950010000009000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0600000001040000000000000600000000000000020000000000000001000000050000000000000000000000010000000000000003000000000000000004000000000000010000000000000079cd00004000000000000000000000000600000000000000000001000000000004000000000000005ff70000000000000200000000000000ff000000001800000500000000a0000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01010000ed35000000000000060000000000000000100000000000000500000004000000292e842d5c0000000400000000000000020000000000000000000100000000000700000000000000ff0700000800000005000000000000002a0e000000000000ff7f000000000000030000000000000000f8ffffffffffff05000000000000000100000010610000000100000020000005000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="01000000d80000000000000001000000000000000600000000000000000000000100000005000000000000000000000000000000010400000000000001000080000000000600000002000000030000000000000000000000001800000200000000000000050000000000000005000000000000002891000000000000f10b000080000000080000000080000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYBLOB="3900000000100000000000000600000000000000fb0f00000000000001000000cbc600"/44], 0x460) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7f, 0xfffffcfb, 0x5, 0x0, r0, 0x7f, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0xc}, 0x48) (async) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) fsopen(&(0x7f0000000040)='nsfs\x00', 0x0) 00:45:42 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r3, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r5, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r6 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r3, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r4, r6, 0xfe, 0xfffffff7}}}, 0x78) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r7, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r8, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r10, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r11 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r8, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r9, r11, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="60040000f5ffffff", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000002000000000000000400000000000000050000000400000006000000000000000400000000000000010100000000000006000000000000003f00000000000000090000000000000009000000c4ffffffffff00000010000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="ff030000070000000000000004000000000000004000000000000000000000007a000000040000000000000001000000000000003f00000000000000020000000000000000000000020000000300000000000000ffffffffffffff7fb100000000000000e30000000000000070ffffffffffffff03000000000000000100008004000000bb0000000080000007000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="9a0000000700000000000000010000000000000001000000000000000100000001000000000000000000000001000000000000000200000000000000040000000000000000400500000000000200000005000000030000000000000000000000000000000100000000000080ffff0000000000000001000000000000e1080000000000000600000001800000341e42950010000009000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0600000001040000000000000600000000000000020000000000000001000000050000000000000000000000010000000000000003000000000000000004000000000000010000000000000079cd00004000000000000000000000000600000000000000000001000000000004000000000000005ff70000000000000200000000000000ff000000001800000500000000a0000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01010000ed35000000000000060000000000000000100000000000000500000004000000292e842d5c0000000400000000000000020000000000000000000100000000000700000000000000ff0700000800000005000000000000002a0e000000000000ff7f000000000000030000000000000000f8ffffffffffff05000000000000000100000010610000000100000020000005000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="06000000020000000000000001000000000000000100000000000000010000000000010000000000000000000600000088f4e2000000000300000000000000020000000000000000080000000000000600000000000000060000000000000001000000000000000200068d59dfba291529dbcb0bb8fe95fa00000000000006000000000000000800000000000000050000000000000003000000800000000300000000000000dad3000068f08cb582c6ebd8ecd13f02ae397d7c8aaf95cceee6af48f3c08d0ba742be9c5a96fb58bcf513d316d51bc01cd2843cf60de805ec18c2da8a69ecda227425b5ce73559c4bc26e0aaa21334329c1864db6b84695c81dac3edba728480599708ebc0e86e640cd4f69c3e0f6e011051e1cde2bf5ed110e587bc14db60e16d3b92adca29806a01b7cb422b2de640ed73a67d9eb718bf61ed8283db2c0e2d8ac7cd412019ce12157801f6b", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="01000000d80000000000000001000000000000000600000000000000000000000100000005000000000000000000000000000000010400000000000001000080000000000600000002000000030000000000000000000000001800000200000000000000050000000000000005000000000000002891000000000000f10b000080000000080000000080000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYBLOB="3900000000100000000000000600000000000000fb0f00000000000001000000cbc600"/44], 0x460) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7f, 0xfffffcfb, 0x5, 0x0, r0, 0x7f, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0xc}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffe, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r3, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r5, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r3, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r4, r6, 0xfe, 0xfffffff7}}}, 0x78) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r7, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r8, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r10, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r8, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r9, r11, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="60040000f5ffffff", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000002000000000000000400000000000000050000000400000006000000000000000400000000000000010100000000000006000000000000003f00000000000000090000000000000009000000c4ffffffffff00000010000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="ff030000070000000000000004000000000000004000000000000000000000007a000000040000000000000001000000000000003f00000000000000020000000000000000000000020000000300000000000000ffffffffffffff7fb100000000000000e30000000000000070ffffffffffffff03000000000000000100008004000000bb0000000080000007000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="9a0000000700000000000000010000000000000001000000000000000100000001000000000000000000000001000000000000000200000000000000040000000000000000400500000000000200000005000000030000000000000000000000000000000100000000000080ffff0000000000000001000000000000e1080000000000000600000001800000341e42950010000009000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0600000001040000000000000600000000000000020000000000000001000000050000000000000000000000010000000000000003000000000000000004000000000000010000000000000079cd00004000000000000000000000000600000000000000000001000000000004000000000000005ff70000000000000200000000000000ff000000001800000500000000a0000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01010000ed35000000000000060000000000000000100000000000000500000004000000292e842d5c0000000400000000000000020000000000000000000100000000000700000000000000ff0700000800000005000000000000002a0e000000000000ff7f000000000000030000000000000000f8ffffffffffff05000000000000000100000010610000000100000020000005000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee01, @ANYRES32=r6, @ANYBLOB="01000000d80000000000000001000000000000000600000000000000000000000100000005000000000000000000000000000000010400000000000001000080000000000600000002000000030000000000000000000000001800000200000000000000050000000000000005000000000000002891000000000000f10b000080000000080000000080000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYBLOB="3900000000100000000000000600000000000000fb0f00000000000001000000cbc600"/44], 0x460) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x7f, 0xfffffcfb, 0x5, 0x0, r0, 0x7f, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0xc}, 0x48) (async) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) [ 2742.686714][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) [ 2742.724318][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e0000"], 0x10) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e0000"], 0x10) [ 2742.760032][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="043e0000"], 0x10) [ 2742.787334][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x1870) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f000000a580)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000008540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r9, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r10 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r7, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x1f, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x2000, 0x6, r8, r10, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_CREATE_OPEN(r3, &(0x7f0000004240)={0xa0, 0x0, r4, {{0x0, 0x1, 0x5, 0x12, 0x1, 0x5, {0x0, 0x5, 0x100, 0x8, 0x9, 0x4a2a, 0x2, 0x46e, 0x800, 0x8000, 0x8, r8, r2, 0x40, 0x6}}, {0x0, 0x1}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x2, 0x1, 0x44, r0, 0x80000000, '\x00', 0x0, r1, 0x2, 0x5, 0x3, 0xc}, 0x48) pipe2$watch_queue(&(0x7f0000004300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r6, &(0x7f00000044c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r11, &(0x7f0000004340)={0xa0, 0x0, r12, {{0x3, 0x1, 0x2, 0x6, 0x800, 0xa3, {0x6, 0x526, 0x4, 0x2, 0x100, 0x3, 0xffffffff, 0x642c772b, 0x200, 0x6000, 0xffffffff, r5, r9, 0x1, 0x200}}}}, 0xa0) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="0404f3090000000000941034ab4f523927a4d8c207f516aa9d07df7806bb0068b3d61b48417801"], 0xd) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000040)={0x80020000, @random="6123b39d413b"}) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="03c900b738ece995ef8b4e533e825d038e92cf95aef32e00"/36], 0x24) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2742.823038][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}, 0x300}, 0x0) [ 2742.848356][ T7866] Bluetooth: unknown link type 126 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="0404f3090000000000941034ab4f523927a4d8c207f516aa9d07df7806bb0068b3d61b48417801"], 0xd) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000040)={0x80020000, @random="6123b39d413b"}) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="03c900b738ece995ef8b4e533e825d038e92cf95aef32e00"/36], 0x24) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x1870) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f000000a580)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000008540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r9, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r10 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r7, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x1f, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x2000, 0x6, r8, r10, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_CREATE_OPEN(r3, &(0x7f0000004240)={0xa0, 0x0, r4, {{0x0, 0x1, 0x5, 0x12, 0x1, 0x5, {0x0, 0x5, 0x100, 0x8, 0x9, 0x4a2a, 0x2, 0x46e, 0x800, 0x8000, 0x8, r8, r2, 0x40, 0x6}}, {0x0, 0x1}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x2, 0x1, 0x44, r0, 0x80000000, '\x00', 0x0, r1, 0x2, 0x5, 0x3, 0xc}, 0x48) (async) pipe2$watch_queue(&(0x7f0000004300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) read$FUSE(r6, &(0x7f00000044c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r11, &(0x7f0000004340)={0xa0, 0x0, r12, {{0x3, 0x1, 0x2, 0x6, 0x800, 0xa3, {0x6, 0x526, 0x4, 0x2, 0x100, 0x3, 0xffffffff, 0x642c772b, 0x200, 0x6000, 0xffffffff, r5, r9, 0x1, 0x200}}}}, 0xa0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 4: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="0404f3090000000000941034ab4f523927a4d8c207f516aa9d07df7806bb0068b3d61b48417801"], 0xd) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000040)={0x80020000, @random="6123b39d413b"}) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="03c900b738ece995ef8b4e533e825d038e92cf95aef32e00"/36], 0x24) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) 00:45:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x1870) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f000000a580)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000008540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r9, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r10 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r7, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x1f, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x2000, 0x6, r8, r10, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_CREATE_OPEN(r3, &(0x7f0000004240)={0xa0, 0x0, r4, {{0x0, 0x1, 0x5, 0x12, 0x1, 0x5, {0x0, 0x5, 0x100, 0x8, 0x9, 0x4a2a, 0x2, 0x46e, 0x800, 0x8000, 0x8, r8, r2, 0x40, 0x6}}, {0x0, 0x1}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x2, 0x1, 0x44, r0, 0x80000000, '\x00', 0x0, r1, 0x2, 0x5, 0x3, 0xc}, 0x48) pipe2$watch_queue(&(0x7f0000004300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r6, &(0x7f00000044c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r11, &(0x7f0000004340)={0xa0, 0x0, r12, {{0x3, 0x1, 0x2, 0x6, 0x800, 0xa3, {0x6, 0x526, 0x4, 0x2, 0x100, 0x3, 0xffffffff, 0x642c772b, 0x200, 0x6000, 0xffffffff, r5, r9, 0x1, 0x200}}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020}, 0x1870) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f000000a580)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000008540)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r9, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r7, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x1f, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x2000, 0x6, r8, r10, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_CREATE_OPEN(r3, &(0x7f0000004240)={0xa0, 0x0, r4, {{0x0, 0x1, 0x5, 0x12, 0x1, 0x5, {0x0, 0x5, 0x100, 0x8, 0x9, 0x4a2a, 0x2, 0x46e, 0x800, 0x8000, 0x8, r8, r2, 0x40, 0x6}}, {0x0, 0x1}}}, 0xa0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x2, 0x1, 0x44, r0, 0x80000000, '\x00', 0x0, r1, 0x2, 0x5, 0x3, 0xc}, 0x48) (async) pipe2$watch_queue(&(0x7f0000004300), 0x80) (async) read$FUSE(r6, &(0x7f00000044c0)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r11, &(0x7f0000004340)={0xa0, 0x0, r12, {{0x3, 0x1, 0x2, 0x6, 0x800, 0xa3, {0x6, 0x526, 0x4, 0x2, 0x100, 0x3, 0xffffffff, 0x642c772b, 0x200, 0x6000, 0xffffffff, r5, r9, 0x1, 0x200}}}}, 0xa0) (async) [ 2742.950058][ T675] Bluetooth: unknown link type 126 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:45:42 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) 00:45:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x1870) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f000000a580)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000008540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r9, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r10 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r7, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x1f, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x2000, 0x6, r8, r10, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_CREATE_OPEN(r3, &(0x7f0000004240)={0xa0, 0x0, r4, {{0x0, 0x1, 0x5, 0x12, 0x1, 0x5, {0x0, 0x5, 0x100, 0x8, 0x9, 0x4a2a, 0x2, 0x46e, 0x800, 0x8000, 0x8, r8, r2, 0x40, 0x6}}, {0x0, 0x1}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x4, 0x2, 0x1, 0x44, r0, 0x80000000, '\x00', 0x0, r1, 0x2, 0x5, 0x3, 0xc}, 0x48) pipe2$watch_queue(&(0x7f0000004300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r6, &(0x7f00000044c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r11, &(0x7f0000004340)={0xa0, 0x0, r12, {{0x3, 0x1, 0x2, 0x6, 0x800, 0xa3, {0x6, 0x526, 0x4, 0x2, 0x100, 0x3, 0xffffffff, 0x642c772b, 0x200, 0x6000, 0xffffffff, r5, r9, 0x1, 0x200}}}}, 0xa0) 00:45:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:42 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2743.003246][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0xffffffff, 0x1, 0x0, 0x20, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 00:45:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.048966][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) 00:45:43 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x42) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:45:43 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x42) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0xffffffff, 0x1, 0x0, 0x20, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) 00:45:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300}, 0x0) [ 2743.148003][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.171941][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 4: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x42) 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0xffffffff, 0x1, 0x0, 0x20, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0xffffffff, 0x1, 0x0, 0x20, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) (async) 00:45:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300}, 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (fail_nth: 1) 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240), 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2743.231502][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000082e2f66696c658d97c54a620900000000000000005d79f17de569a426d0bfc51f00000000"]) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x4c6500, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0x3, 0x4) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$smackfs_ptrace(r3, &(0x7f0000000280), 0x14) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 00:45:43 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x300}, 0x0) [ 2743.261979][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.280487][ T9059] FAULT_INJECTION: forcing a failure. [ 2743.280487][ T9059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2743.282843][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.306845][ T9059] CPU: 1 PID: 9059 Comm: syz-executor.4 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2743.309367][ T9059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 2743.310029][ T7866] Bluetooth: unknown link type 126 [ 2743.311828][ T9059] Call trace: [ 2743.311834][ T9059] dump_backtrace+0x1c4/0x1f0 [ 2743.311846][ T9059] show_stack+0x2c/0x54 [ 2743.311853][ T9059] dump_stack_lvl+0x104/0x16c [ 2743.311863][ T9059] dump_stack+0x1c/0x58 [ 2743.311871][ T9059] should_fail+0x1dc/0x200 [ 2743.311879][ T9059] should_fail_usercopy+0x20/0x30 [ 2743.311886][ T9059] simple_read_from_buffer+0xc0/0x1cc 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240), 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2743.311894][ T9059] proc_fail_nth_read+0xf4/0x164 [ 2743.311903][ T9059] vfs_read+0x19c/0x448 [ 2743.311910][ T9059] ksys_read+0xb4/0x160 [ 2743.311917][ T9059] __arm64_sys_read+0x24/0x34 [ 2743.311925][ T9059] el0_svc_common+0x138/0x220 [ 2743.311934][ T9059] do_el0_svc+0x48/0x164 [ 2743.311942][ T9059] el0_svc+0x58/0x150 [ 2743.311950][ T9059] el0t_64_sync_handler+0x84/0xf0 [ 2743.311959][ T9059] el0t_64_sync+0x18c/0x190 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000082e2f66696c658d97c54a620900000000000000005d79f17de569a426d0bfc51f00000000"]) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x4c6500, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0x3, 0x4) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$smackfs_ptrace(r3, &(0x7f0000000280), 0x14) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000082e2f66696c658d97c54a620900000000000000005d79f17de569a426d0bfc51f00000000"]) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x4c6500, 0x0) (async) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0x3, 0x4) (async) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) read$smackfs_ptrace(r3, &(0x7f0000000280), 0x14) (async) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) [ 2743.360963][ T3126] Bluetooth: hci4: command 0x201b tx timeout 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) 00:45:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.392682][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240), 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x2, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000082e2f66696c658d97c54a620900000000000000005d79f17de569a426d0bfc51f00000000"]) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x4c6500, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0x3, 0x4) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$smackfs_ptrace(r3, &(0x7f0000000280), 0x14) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000082e2f66696c658d97c54a620900000000000000005d79f17de569a426d0bfc51f00000000"]) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x4c6500, 0x0) (async) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0x3, 0x4) (async) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) read$smackfs_ptrace(r3, &(0x7f0000000280), 0x14) (async) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) 00:45:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.457212][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(0x0, 0x0) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) [ 2743.531483][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2743.559174][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(0x0, 0x0) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(0x0, 0x0) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2743.673285][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1, 0x9d49, 0x8, 0x1800, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x4, 0x3, 0x3}, 0x48) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 1: fsopen(&(0x7f0000000140)='pstore\x00', 0x0) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1, 0x9d49, 0x8, 0x1800, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x4, 0x3, 0x3}, 0x48) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) [ 2743.745169][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 1: fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x800) [ 2743.792510][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1, 0x9d49, 0x8, 0x1800, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x4, 0x3, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x1, 0x9d49, 0x8, 0x1800, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x4, 0x3, 0x3}, 0x48) (async) 00:45:43 executing program 5: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x23c382, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000240)=0x2, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x0, @none, "7ce06ea0fdb15806630b053080d925e033b33d214046d057a59cde409f8d893f4d96262212ff9f456da9b1a96ceff5d13ad318aac15d8567f6b5bfab7f615ad119a0949d80a8954180ca5352b943017a0363fca524f6b6cebe4f9b23184494092bde07804285fa507412bc3e557df3f48abe21348b15e7629aadbc5091406e9c0fe14faca10f924354f67d160c70fca5358344c874298cee431bfdc32d7ae9abf8c3aae0c9eda7fc005ea863380d23ac237195672e4d113bf748a9d23a97150da16e8da19cdf9f74d1cbb0bd4df4f2979a8702fdd0af0e1a8833b2d5cee1edc98f6af3804b8ed67a04cbe0df5ddba7acba90157aacfff90e"}}}, 0x102) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 1: fsopen(0x0, 0x0) 00:45:43 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x800) [ 2743.856838][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) 00:45:43 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x0) 00:45:43 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 1: fsopen(0x0, 0x0) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x0) [ 2743.936338][ T7866] Bluetooth: unknown link type 126 00:45:43 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 1: fsopen(0x0, 0x0) 00:45:43 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:43 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) 00:45:43 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x800) 00:45:43 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) (async) 00:45:43 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) [ 2743.994983][ T675] Bluetooth: unknown link type 126 00:45:43 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="181b0000", @ANYRES32, @ANYBLOB="00000000000000000a7a8677000004001849000900000000000059540100ffffffff1800000000001f000000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8, 0xf9, &(0x7f00000002c0)=""/249, 0x40f00, 0x2b, '\x00', r0, 0xe, r1, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0xc, 0x1ff, 0x8}, 0x10, r2, r1, 0x0, &(0x7f0000000480)=[r1]}, 0x80) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x800) [ 2744.084140][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x2}, 0x8) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x800) [ 2744.152507][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x8, 0x10, 0x10001, 0x8, {{0x14, 0x4, 0x3, 0x5, 0x50, 0x68, 0x0, 0x49, 0x4, 0x0, @rand_addr=0x64010101, @multicast1, {[@cipso={0x86, 0x13, 0x2, [{0x2, 0xd, "64b024918b5db2c3f3a7eb"}]}, @generic={0x94, 0x5, "19ded1"}, @noop, @timestamp_prespec={0x44, 0x14, 0xcc, 0x3, 0x8, [{@broadcast, 0x1000}, {@empty, 0x2}]}, @end, @generic={0x7, 0xe, "04f7c2d72c2e81216fcd6501"}]}}}}}) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x8, 0x10, 0x10001, 0x8, {{0x14, 0x4, 0x3, 0x5, 0x50, 0x68, 0x0, 0x49, 0x4, 0x0, @rand_addr=0x64010101, @multicast1, {[@cipso={0x86, 0x13, 0x2, [{0x2, 0xd, "64b024918b5db2c3f3a7eb"}]}, @generic={0x94, 0x5, "19ded1"}, @noop, @timestamp_prespec={0x44, 0x14, 0xcc, 0x3, 0x8, [{@broadcast, 0x1000}, {@empty, 0x2}]}, @end, @generic={0x7, 0xe, "04f7c2d72c2e81216fcd6501"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x8, 0x10, 0x10001, 0x8, {{0x14, 0x4, 0x3, 0x5, 0x50, 0x68, 0x0, 0x49, 0x4, 0x0, @rand_addr=0x64010101, @multicast1, {[@cipso={0x86, 0x13, 0x2, [{0x2, 0xd, "64b024918b5db2c3f3a7eb"}]}, @generic={0x94, 0x5, "19ded1"}, @noop, @timestamp_prespec={0x44, 0x14, 0xcc, 0x3, 0x8, [{@broadcast, 0x1000}, {@empty, 0x2}]}, @end, @generic={0x7, 0xe, "04f7c2d72c2e81216fcd6501"}]}}}}}) (async) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) [ 2744.207382][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x8, 0x10, 0x10001, 0x8, {{0x14, 0x4, 0x3, 0x5, 0x50, 0x68, 0x0, 0x49, 0x4, 0x0, @rand_addr=0x64010101, @multicast1, {[@cipso={0x86, 0x13, 0x2, [{0x2, 0xd, "64b024918b5db2c3f3a7eb"}]}, @generic={0x94, 0x5, "19ded1"}, @noop, @timestamp_prespec={0x44, 0x14, 0xcc, 0x3, 0x8, [{@broadcast, 0x1000}, {@empty, 0x2}]}, @end, @generic={0x7, 0xe, "04f7c2d72c2e81216fcd6501"}]}}}}}) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x800) [ 2744.274500][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x7800, 0x8, 0x4, 0x6, {{0x21, 0x4, 0x1, 0x7, 0x84, 0x67, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x1c, 0x80, 0x1, 0xf, [{@multicast1, 0x4}, {@multicast2, 0x5}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x40}]}, @noop, @cipso={0x86, 0x18, 0x0, [{0x5, 0x12, "fac23a02be7ad842389eb241610b4480"}]}, @cipso={0x86, 0x28, 0x2, [{0x2, 0x2}, {0x1, 0x7, "ba2b546a3b"}, {0x1, 0x2}, {0x0, 0x7, "f3b12f019e"}, {0x7, 0xe, "a92e3c2b4087f3a3b19451c1"}, {0x1, 0x2}]}, @generic={0x89, 0xe, "8589ac40cae04d8477ec2d52"}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 2: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="03c80085b3740aeded60a2bfe53bd5b0a9463d4d0224ef29291e22d251e9d7dfda852a007c0fb515a7e9003e45484eb80ec40239db7766d2eded8d78e60a928f9791cbb7ac41565154f2b7fa31633c5931843fd2348fc9a5702ff21a93d76d4da9719296077bfb8c5c8ea0475ecc616afb918799be98d985dc2fc7bb6cc186de7e"], 0x89) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x1, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x800) [ 2744.354701][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="03c80085b3740aeded60a2bfe53bd5b0a9463d4d0224ef29291e22d251e9d7dfda852a007c0fb515a7e9003e45484eb80ec40239db7766d2eded8d78e60a928f9791cbb7ac41565154f2b7fa31633c5931843fd2348fc9a5702ff21a93d76d4da9719296077bfb8c5c8ea0475ecc616afb918799be98d985dc2fc7bb6cc186de7e"], 0x89) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="03c80085b3740aeded60a2bfe53bd5b0a9463d4d0224ef29291e22d251e9d7dfda852a007c0fb515a7e9003e45484eb80ec40239db7766d2eded8d78e60a928f9791cbb7ac41565154f2b7fa31633c5931843fd2348fc9a5702ff21a93d76d4da9719296077bfb8c5c8ea0475ecc616afb918799be98d985dc2fc7bb6cc186de7e"], 0x89) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x800) [ 2744.424499][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x1, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) [ 2744.494891][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x1, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x800) [ 2744.562988][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x1, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x2, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x800) [ 2744.630122][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x8, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x1a43, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) [ 2744.683038][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x800) [ 2744.724447][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x2, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x28) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x2, 0x4) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (rerun: 32) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x28) [ 2744.805047][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x28) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13}, 0x28) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="74756e6c03001c0048714a0097ebb14b9f622a8cd7bc243c1a531d55de9b7a", @ANYRES32=0x0, @ANYRESHEX=0x0]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffff001}}, './file0\x00'}) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, &(0x7f0000000140)=0x14) [ 2744.862791][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x800) [ 2744.896772][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="74756e6c03001c0048714a0097ebb14b9f622a8cd7bc243c1a531d55de9b7a", @ANYRES32=0x0, @ANYRESHEX=0x0]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffff001}}, './file0\x00'}) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="74756e6c03001c0048714a0097ebb14b9f622a8cd7bc243c1a531d55de9b7a", @ANYRES32=0x0, @ANYRESHEX=0x0]}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffff001}}, './file0\x00'}) (async) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, &(0x7f0000000140)=0x14) (async) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x0) [ 2744.946297][ T7866] Bluetooth: unknown link type 126 00:45:44 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:44 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2744.972027][ T675] Bluetooth: unknown link type 126 00:45:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="74756e6c03001c0048714a0097ebb14b9f622a8cd7bc243c1a531d55de9b7a", @ANYRES32=0x0, @ANYRESHEX=0x0]}) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffff001}}, './file0\x00'}) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast2}, &(0x7f0000000140)=0x14) 00:45:44 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x800) 00:45:44 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x800) [ 2745.042697][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00020000000000002e2f660000653000"]) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x60e0a5b7, 0x0, r0, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0x1) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x800) [ 2745.077068][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00020000000000002e2f660000653000"]) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x60e0a5b7, 0x0, r0, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0x1) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x800) [ 2745.120230][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x800) [ 2745.146559][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x800) [ 2745.168841][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00020000000000002e2f660000653000"]) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x60e0a5b7, 0x0, r0, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00020000000000002e2f660000653000"]) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x60e0a5b7, 0x0, r0, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0x1) (async) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) (async) [ 2745.209965][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x800) [ 2745.257737][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) (async) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2745.288072][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0xfffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) (async) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x4000800) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x19) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_DIRENT(r0, &(0x7f0000004680)=ANY=[@ANYBLOB="c801000000000000", @ANYRES64=r2, @ANYBLOB="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"], 0x1c8) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x0) [ 2745.349329][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x4000800) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x19) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7}) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_DIRENT(r0, &(0x7f0000004680)=ANY=[@ANYBLOB="c801000000000000", @ANYRES64=r2, @ANYBLOB="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"], 0x1c8) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x4000800) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x19) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_DIRENT(r0, &(0x7f0000004680)=ANY=[@ANYBLOB="c801000000000000", @ANYRES64=r2, @ANYBLOB="0600000000000000ff07000000000000040000000cb000002d5e2f2b00000000000000000000000005000000000000000b000000060000002f6465762f76637361230000000000000000000000000000080000000000000000000000010000080400000000000000ffffffffffffffff0b000000feffffff2f6465762f766373612300000000000006000000000000000800000000100000ed000000ba0a00007b8845c46d9e3a0001000066c69641313551fa7f1e6ea21aef9b0ec7c3dfd6b1ee5e4edccb0ba2a6fcc8e97b82d7fb9a93dde37699582cf352d2249b72932fdb725ed308a693c59361acfef9c5a1ca3a9e086d9498bbe01e467f2089e114e171020796f105be3ebdb95ebb6ea1227622fe06c5aed76515d7b9057e829b94bc7cca50e27fbad417f8a846d3a35352f824823f27fe42d1707d912b6e2d82e70043eeb59e24441f113399e8b1253dcbd20cc191bc76d8830b02f8912df7df1e0f018f75839089e05369269977bca30a046c8e989fdab085b2658fe74a33ff45baa12d7342efe46a9c7015a279c16d000000020000000000000005000000000000000b000000d00600002f6465762f7663736123000000000000"], 0x1c8) (async) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x0) [ 2745.428955][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x0) [ 2745.441002][ T3126] Bluetooth: hci4: command 0x201b tx timeout 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 00:45:45 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x4000800) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x19) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 64) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x7}) (rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_DIRENT(r0, &(0x7f0000004680)=ANY=[@ANYBLOB="c801000000000000", @ANYRES64=r2, @ANYBLOB="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"], 0x1c8) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) [ 2745.490186][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x0, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) write$FUSE_ATTR(r0, &(0x7f0000002140)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xff, 0x0, {0x1, 0x2, 0x0, 0x80000001, 0x20, 0xffff, 0x8, 0xd76, 0x0, 0xa000, 0x4bb7, r5, r8, 0x4d4, 0x9}}}, 0x78) 00:45:45 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x0, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) write$FUSE_ATTR(r0, &(0x7f0000002140)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xff, 0x0, {0x1, 0x2, 0x0, 0x80000001, 0x20, 0xffff, 0x8, 0xd76, 0x0, 0xa000, 0x4bb7, r5, r8, 0x4d4, 0x9}}}, 0x78) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x0, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) (async) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r6, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) write$FUSE_ATTR(r0, &(0x7f0000002140)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xff, 0x0, {0x1, 0x2, 0x0, 0x80000001, 0x20, 0xffff, 0x8, 0xd76, 0x0, 0xa000, 0x4bb7, r5, r8, 0x4d4, 0x9}}}, 0x78) (async) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2745.573911][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r1, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x0, 0x1000, 0x400, 0xee01, r3, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r4 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r1, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r2, r4, 0xfe, 0xfffffff7}}}, 0x78) (async) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r6, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r7, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r8, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) write$FUSE_ATTR(r0, &(0x7f0000002140)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xff, 0x0, {0x1, 0x2, 0x0, 0x80000001, 0x20, 0xffff, 0x8, 0xd76, 0x0, 0xa000, 0x4bb7, r5, r8, 0x4d4, 0x9}}}, 0x78) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x800) [ 2745.606531][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2745.650348][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x3}, 0x48) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0x480041, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=@raw=[@exit, @alu={0x7, 0x1, 0x0, 0x4670c3d186781c11, 0x3, 0x0, 0x1a621cec05e7fdc0}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x40e00, 0x5, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x4, 0xd72, 0xfff}, 0x10, 0xffffffffffffffff, r0}, 0x80) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x800) [ 2745.713145][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x3}, 0x48) (async) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0x480041, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=@raw=[@exit, @alu={0x7, 0x1, 0x0, 0x4670c3d186781c11, 0x3, 0x0, 0x1a621cec05e7fdc0}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x40e00, 0x5, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x4, 0xd72, 0xfff}, 0x10, 0xffffffffffffffff, r0}, 0x80) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000002c0)) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1, 0x3, 0x7fff}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000180)={r1, 0x400, 0x800}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000000000002e2f722db364ab43"]) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000280)=r1) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000002c0)) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1, 0x3, 0x7fff}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000180)={r1, 0x400, 0x800}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000000000002e2f722db364ab43"]) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000280)=r1) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000002c0)) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1, 0x3, 0x7fff}) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000180)={r1, 0x400, 0x800}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="08000000000000002e2f722db364ab43"]) (async) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000300)) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000280)=r1) (async) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x3}, 0x48) (async) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0x480041, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000000)=@raw=[@exit, @alu={0x7, 0x1, 0x0, 0x4670c3d186781c11, 0x3, 0x0, 0x1a621cec05e7fdc0}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x40e00, 0x5, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x4, 0xd72, 0xfff}, 0x10, 0xffffffffffffffff, r0}, 0x80) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x800) [ 2745.787016][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000002c0)) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1, 0x3, 0x7fff}) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000180)={r1, 0x400, 0x800}) (async) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="08000000000000002e2f722db364ab43"]) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) (async) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, &(0x7f0000000300)) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000280)=r1) 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000000)={0x5, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @dev}]}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @random}, {}]}) [ 2745.828278][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x400802, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) [ 2745.870536][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000000)={0x5, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @dev}]}) (async, rerun: 32) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) (rerun: 32) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @random}, {}]}) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2745.899112][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x400802, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2745.937941][ T675] Bluetooth: unknown link type 126 00:45:45 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000000)={0x5, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @dev}]}) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @random}, {}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000000)={0x5, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @dev}]}) (async) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) (async) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @random}, {}]}) (async) [ 2745.969668][ T7866] Bluetooth: unknown link type 126 00:45:45 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x400802, 0x0) (async, rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (rerun: 64) 00:45:45 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:45 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x800) 00:45:45 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x800) [ 2745.995838][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) [ 2746.033439][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x8afe8c8f2aaebf61, 0x35, 0x0, 0x65, 0x35, 0x62, 0x31, 0x38, 0x37, 0x64, 0x61, 0x63, 0x37, 0x31, 0x37]}, &(0x7f0000000080)={0x0, "f833bada2a34b004993dd545e3cc6b91d2349509db880fa35913f1cab30759c7d8d5b828eb96e9c9264f24460e252659e16f6f5afe005143b4d5ec948ed35bd5", 0x26}, 0x48, r0) [ 2746.052627][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x0) [ 2746.083733][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x800) [ 2746.099036][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x8afe8c8f2aaebf61, 0x35, 0x0, 0x65, 0x35, 0x62, 0x31, 0x38, 0x37, 0x64, 0x61, 0x63, 0x37, 0x31, 0x37]}, &(0x7f0000000080)={0x0, "f833bada2a34b004993dd545e3cc6b91d2349509db880fa35913f1cab30759c7d8d5b828eb96e9c9264f24460e252659e16f6f5afe005143b4d5ec948ed35bd5", 0x26}, 0x48, r0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x8afe8c8f2aaebf61, 0x35, 0x0, 0x65, 0x35, 0x62, 0x31, 0x38, 0x37, 0x64, 0x61, 0x63, 0x37, 0x31, 0x37]}, &(0x7f0000000080)={0x0, "f833bada2a34b004993dd545e3cc6b91d2349509db880fa35913f1cab30759c7d8d5b828eb96e9c9264f24460e252659e16f6f5afe005143b4d5ec948ed35bd5", 0x26}, 0x48, r0) (async) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r1, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x800) [ 2746.158002][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) (async) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) r0 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x35, 0x8afe8c8f2aaebf61, 0x35, 0x0, 0x65, 0x35, 0x62, 0x31, 0x38, 0x37, 0x64, 0x61, 0x63, 0x37, 0x31, 0x37]}, &(0x7f0000000080)={0x0, "f833bada2a34b004993dd545e3cc6b91d2349509db880fa35913f1cab30759c7d8d5b828eb96e9c9264f24460e252659e16f6f5afe005143b4d5ec948ed35bd5", 0x26}, 0x48, r0) [ 2746.225137][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r1}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xc, 0xfffffffa, 0x4, 0x8, 0x80, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x10) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.255116][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(0x0, 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.280787][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x800) [ 2746.308794][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r1}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xc, 0xfffffffa, 0x4, 0x8, 0x80, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x1, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r1}, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xc, 0xfffffffa, 0x4, 0x8, 0x80, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) (async) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x10) 00:45:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r1}, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xc, 0xfffffffa, 0x4, 0x8, 0x80, r0, 0x3, '\x00', r2, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) [ 2746.358412][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x10) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x800) [ 2746.391982][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x0) [ 2746.424236][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.438705][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x48) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x10001, 0x20000) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x80) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$NBD_DO_IT(r3, 0xab03) r4 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) bind$netrom(r2, &(0x7f0000000040)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x800) [ 2746.502527][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 1: r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) syz_emit_vhci(&(0x7f0000000200)=ANY=[@ANYBLOB="95564de4d021e52946ecaa34a27c8c5f6c72f48762e4ff2dc65ab41afeea93d018f6667c1f2b35faffffff78b2b2e5a7cf7243da008755f31ce43aec1209058b6eb81ce916c1d8e4c5dca4"], 0x9) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x48) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.535835][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.557414][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 2746.596379][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x48) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x10001, 0x20000) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x80) (async, rerun: 64) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (rerun: 64) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) (async) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$NBD_DO_IT(r3, 0xab03) (async) r4 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) (async, rerun: 64) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) (rerun: 64) bind$netrom(r2, &(0x7f0000000040)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.651863][ T9903] FAULT_INJECTION: forcing a failure. [ 2746.651863][ T9903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2746.655328][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 2746.669850][ T9903] CPU: 1 PID: 9903 Comm: syz-executor.1 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2746.672365][ T9903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 2746.674857][ T9903] Call trace: [ 2746.675640][ T9903] dump_backtrace+0x1c4/0x1f0 [ 2746.676807][ T9903] show_stack+0x2c/0x54 [ 2746.677838][ T9903] dump_stack_lvl+0x104/0x16c [ 2746.678968][ T9903] dump_stack+0x1c/0x58 [ 2746.679978][ T9903] should_fail+0x1dc/0x200 [ 2746.681126][ T9903] should_fail_usercopy+0x20/0x30 [ 2746.682388][ T9903] simple_read_from_buffer+0xc0/0x1cc [ 2746.683694][ T9903] proc_fail_nth_read+0xf4/0x164 [ 2746.684916][ T9903] vfs_read+0x19c/0x448 [ 2746.685954][ T9903] ksys_read+0xb4/0x160 [ 2746.687001][ T9903] __arm64_sys_read+0x24/0x34 [ 2746.688153][ T9903] el0_svc_common+0x138/0x220 [ 2746.689305][ T9903] do_el0_svc+0x48/0x164 [ 2746.690367][ T9903] el0_svc+0x58/0x150 [ 2746.691372][ T9903] el0t_64_sync_handler+0x84/0xf0 [ 2746.692571][ T9903] el0t_64_sync+0x18c/0x190 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2746.713578][ T9911] FAULT_INJECTION: forcing a failure. [ 2746.713578][ T9911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2746.716759][ T9911] CPU: 0 PID: 9911 Comm: syz-executor.5 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2746.719244][ T9911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 2746.721646][ T9911] Call trace: [ 2746.722445][ T9911] dump_backtrace+0x1c4/0x1f0 [ 2746.723617][ T9911] show_stack+0x2c/0x54 [ 2746.724688][ T9911] dump_stack_lvl+0x104/0x16c [ 2746.725867][ T9911] dump_stack+0x1c/0x58 [ 2746.726903][ T9911] should_fail+0x1dc/0x200 [ 2746.727996][ T9911] should_fail_usercopy+0x20/0x30 [ 2746.729272][ T9911] simple_read_from_buffer+0xc0/0x1cc [ 2746.730659][ T9911] proc_fail_nth_read+0xf4/0x164 [ 2746.731882][ T9911] vfs_read+0x19c/0x448 [ 2746.732890][ T9911] ksys_read+0xb4/0x160 [ 2746.733975][ T9911] __arm64_sys_read+0x24/0x34 [ 2746.735112][ T9911] el0_svc_common+0x138/0x220 [ 2746.736276][ T9911] do_el0_svc+0x48/0x164 [ 2746.737357][ T9911] el0_svc+0x58/0x150 [ 2746.738383][ T9911] el0t_64_sync_handler+0x84/0xf0 [ 2746.739678][ T9911] el0t_64_sync+0x18c/0x190 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) [ 2746.750202][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x10001, 0x20000) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x80) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$NBD_DO_IT(r3, 0xab03) r4 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) bind$netrom(r2, &(0x7f0000000040)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_open_dev$vcsa(&(0x7f0000000000), 0x10001, 0x20000) (async) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x80) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000000c0)) (async) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) ioctl$NBD_DO_IT(r3, 0xab03) (async) fsopen(&(0x7f0000000140)='pstore\x00', 0x0) (async) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) (async) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) bind$netrom(r2, &(0x7f0000000040)={{0x3, @default, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) (async) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) [ 2746.801331][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000061c0)={0x90, 0x0, r1, [{0x5, 0x1, 0x8, 0x9dc, '@!\\}\xe7/\\$'}, {0x4, 0x20, 0x1, 0x5, '{'}, {0x3, 0xffffffffffffffc0, 0x1, 0x69, '\x00'}, {0x3, 0x4, 0x6, 0x800, '^\\*@,/'}]}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000000)={0x78, 0x0, r0, {0x94c, 0x3, 0x0, {0x5, 0xd6, 0x8000000000000001, 0xcd, 0x6, 0x80000001, 0x9, 0x6, 0x80000000, 0xa000, 0x5, r2, 0xffffffffffffffff, 0x7, 0x7653}}}, 0x78) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x2, r0}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x0) [ 2746.898843][ T7866] Bluetooth: unknown link type 126 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000061c0)={0x90, 0x0, r1, [{0x5, 0x1, 0x8, 0x9dc, '@!\\}\xe7/\\$'}, {0x4, 0x20, 0x1, 0x5, '{'}, {0x3, 0xffffffffffffffc0, 0x1, 0x69, '\x00'}, {0x3, 0x4, 0x6, 0x800, '^\\*@,/'}]}, 0x90) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000000)={0x78, 0x0, r0, {0x94c, 0x3, 0x0, {0x5, 0xd6, 0x8000000000000001, 0xcd, 0x6, 0x80000001, 0x9, 0x6, 0x80000000, 0xa000, 0x5, r2, 0xffffffffffffffff, 0x7, 0x7653}}}, 0x78) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x2, r0}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000061c0)={0x90, 0x0, r1, [{0x5, 0x1, 0x8, 0x9dc, '@!\\}\xe7/\\$'}, {0x4, 0x20, 0x1, 0x5, '{'}, {0x3, 0xffffffffffffffc0, 0x1, 0x69, '\x00'}, {0x3, 0x4, 0x6, 0x800, '^\\*@,/'}]}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000000)={0x78, 0x0, r0, {0x94c, 0x3, 0x0, {0x5, 0xd6, 0x8000000000000001, 0xcd, 0x6, 0x80000001, 0x9, 0x6, 0x80000000, 0xa000, 0x5, r2, 0xffffffffffffffff, 0x7, 0x7653}}}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000061c0)={0x90, 0x0, r1, [{0x5, 0x1, 0x8, 0x9dc, '@!\\}\xe7/\\$'}, {0x4, 0x20, 0x1, 0x5, '{'}, {0x3, 0xffffffffffffffc0, 0x1, 0x69, '\x00'}, {0x3, 0x4, 0x6, 0x800, '^\\*@,/'}]}, 0x90) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000000)={0x78, 0x0, r0, {0x94c, 0x3, 0x0, {0x5, 0xd6, 0x8000000000000001, 0xcd, 0x6, 0x80000001, 0x9, 0x6, 0x80000000, 0xa000, 0x5, r2, 0xffffffffffffffff, 0x7, 0x7653}}}, 0x78) (async) 00:45:46 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x0) [ 2746.970735][ T675] Bluetooth: unknown link type 126 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (rerun: 64) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 64) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x2, r0}) (async, rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:46 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:46 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 2747.028081][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x3ea5529a03a6c036, 0x8, 0x5, 0x9, {{0x26, 0x4, 0x3, 0x2d, 0x98, 0x68, 0x0, 0x2, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, {[@lsrr={0x83, 0x7, 0xb1, [@private=0xa010101]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x7, 0x80, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x21, 0x0, [{0x5, 0x4, '\v5'}, {0x1, 0x7, "6e88ea0e55"}, {0x5, 0x6, "3f720fbd"}, {0x7, 0xa, "504b7aa3624e8993"}]}, @timestamp_prespec={0x44, 0x34, 0x30, 0x3, 0xa, [{@multicast1, 0x4901}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x97}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x4}, {@rand_addr=0x64010100, 0x2}, {@remote, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0xae, 0x3, 0x3, [{@loopback}, {@private=0xa010101, 0x80}]}, @ssrr={0x89, 0x7, 0xf6, [@rand_addr=0x64010102]}]}}}}}) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0xffffffff, 0x200000, 0x6, 0x1800, r0, 0x1, '\x00', 0x0, r0, 0x5, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x8f, &(0x7f0000000100)=""/143, 0x41000, 0xf, '\x00', r1, 0x1f, r2, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x3, 0x4da}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r3]}, 0x80) [ 2747.086845][ T9998] FAULT_INJECTION: forcing a failure. [ 2747.086845][ T9998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2747.089984][ T9998] CPU: 0 PID: 9998 Comm: syz-executor.3 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2747.092512][ T9998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 2747.094960][ T9998] Call trace: [ 2747.095763][ T9998] dump_backtrace+0x1c4/0x1f0 [ 2747.097237][ T9998] show_stack+0x2c/0x54 [ 2747.098263][ T9998] dump_stack_lvl+0x104/0x16c [ 2747.099431][ T9998] dump_stack+0x1c/0x58 [ 2747.100456][ T9998] should_fail+0x1dc/0x200 [ 2747.101625][ T9998] should_fail_usercopy+0x20/0x30 [ 2747.102919][ T9998] simple_read_from_buffer+0xc0/0x1cc [ 2747.104300][ T9998] proc_fail_nth_read+0xf4/0x164 [ 2747.105529][ T9998] vfs_read+0x19c/0x448 [ 2747.106580][ T9998] ksys_read+0xb4/0x160 [ 2747.107633][ T9998] __arm64_sys_read+0x24/0x34 [ 2747.108789][ T9998] el0_svc_common+0x138/0x220 [ 2747.109946][ T9998] do_el0_svc+0x48/0x164 [ 2747.111029][ T9998] el0_svc+0x58/0x150 [ 2747.112003][ T9998] el0t_64_sync_handler+0x84/0xf0 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/219, 0xdb) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 00:45:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x3ea5529a03a6c036, 0x8, 0x5, 0x9, {{0x26, 0x4, 0x3, 0x2d, 0x98, 0x68, 0x0, 0x2, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, {[@lsrr={0x83, 0x7, 0xb1, [@private=0xa010101]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x7, 0x80, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x21, 0x0, [{0x5, 0x4, '\v5'}, {0x1, 0x7, "6e88ea0e55"}, {0x5, 0x6, "3f720fbd"}, {0x7, 0xa, "504b7aa3624e8993"}]}, @timestamp_prespec={0x44, 0x34, 0x30, 0x3, 0xa, [{@multicast1, 0x4901}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x97}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x4}, {@rand_addr=0x64010100, 0x2}, {@remote, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0xae, 0x3, 0x3, [{@loopback}, {@private=0xa010101, 0x80}]}, @ssrr={0x89, 0x7, 0xf6, [@rand_addr=0x64010102]}]}}}}}) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0xffffffff, 0x200000, 0x6, 0x1800, r0, 0x1, '\x00', 0x0, r0, 0x5, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x8f, &(0x7f0000000100)=""/143, 0x41000, 0xf, '\x00', r1, 0x1f, r2, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x3, 0x4da}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r3]}, 0x80) [ 2747.113285][ T9998] el0t_64_sync+0x18c/0x190 [ 2747.122145][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x0) [ 2747.161078][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'ip_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x3ea5529a03a6c036, 0x8, 0x5, 0x9, {{0x26, 0x4, 0x3, 0x2d, 0x98, 0x68, 0x0, 0x2, 0x29, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, {[@lsrr={0x83, 0x7, 0xb1, [@private=0xa010101]}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0x7, 0x80, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x21, 0x0, [{0x5, 0x4, '\v5'}, {0x1, 0x7, "6e88ea0e55"}, {0x5, 0x6, "3f720fbd"}, {0x7, 0xa, "504b7aa3624e8993"}]}, @timestamp_prespec={0x44, 0x34, 0x30, 0x3, 0xa, [{@multicast1, 0x4901}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x97}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x4}, {@rand_addr=0x64010100, 0x2}, {@remote, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0xae, 0x3, 0x3, [{@loopback}, {@private=0xa010101, 0x80}]}, @ssrr={0x89, 0x7, 0xf6, [@rand_addr=0x64010102]}]}}}}}) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x19, 0xffffffff, 0x200000, 0x6, 0x1800, r0, 0x1, '\x00', 0x0, r0, 0x5, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x8f, &(0x7f0000000100)=""/143, 0x41000, 0xf, '\x00', r1, 0x1f, r2, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xc, 0x3, 0x4da}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r3]}, 0x80) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x0) [ 2747.195582][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/219, 0xdb) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, 0x0, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x0) [ 2747.232081][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x4, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, 0x0, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2747.261928][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/219, 0xdb) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/219, 0xdb) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) 00:45:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, 0x0, 0x0) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x0) [ 2747.315825][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) [ 2747.380555][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x6, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x41eb, 0x3) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xb6) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCCBRK(r1, 0x5428) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x8, @remote}) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2747.423419][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2747.457051][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x41eb, 0x3) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xb6) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$TIOCCBRK(r1, 0x5428) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x8, @remote}) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x41eb, 0x3) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xb6) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$TIOCCBRK(r1, 0x5428) (async) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x8, @remote}) (async) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x7, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2747.493987][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x0, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x20000, 0x821, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x0) [ 2747.520964][ T3126] Bluetooth: hci4: command 0x201b tx timeout [ 2747.526847][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x8, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x41eb, 0x3) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xb6) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$TIOCCBRK(r1, 0x5428) (async) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000100)={0x8, @remote}) [ 2747.562706][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x0, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x20000, 0x821, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x0, 0x3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x20000, 0x821, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (async) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x9, 0x0, 0xffffffffffffffff, 0x0) [ 2747.596542][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) [ 2747.629323][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x0, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x20000, 0x821, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x0, 0x3}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x20000, 0x821, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) (async) [ 2747.659635][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xa, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x0) [ 2747.687363][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) [ 2747.757064][ T675] Bluetooth: unknown link type 126 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xc, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x7fd) (async) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc57846000000000000"], 0xd) [ 2747.810515][ T7866] Bluetooth: unknown link type 126 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xd, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: socketpair(0x2c, 0x6, 0x80000001, &(0x7f0000000040)={0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xfffffffffffffffe) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x16) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000140), 0x4) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:45:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(0x0, 0xd) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x72063, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xe, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 4: socketpair(0x2c, 0x6, 0x80000001, &(0x7f0000000040)={0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xfffffffffffffffe) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x16) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000140), 0x4) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair(0x2c, 0x6, 0x80000001, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xfffffffffffffffe) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x16) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000140), 0x4) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x72063, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(0x0, 0xd) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0xf, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x10, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 2: openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x72063, 0x0) 00:45:47 executing program 4: socketpair(0x2c, 0x6, 0x80000001, &(0x7f0000000040)={0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0xfffffffffffffffe) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r2, 0x5760, 0x16) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000140), 0x4) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:45:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x0) 00:45:47 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(0x0, 0xd) 00:45:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xe2) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x11, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) bind$netrom(r0, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@bcast, @default, @bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000000)={0xf9157ee2f64150b0, 0x1000}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000dda8000000ebe6a73a", @ANYRES32=r0, @ANYBLOB="f9ffffff000000002e2f66696c653000"]) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0xffff367d, &(0x7f0000000200)=0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x470040, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) r5 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10000, 0x141200) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20, 0x0, r1, {0x101, 0x4, 0x0, 0x6}}, 0x20) write$6lowpan_control(r0, &(0x7f00000002c0)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) ioctl$NBD_DO_IT(r0, 0xab03) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xe2) (async) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[], 0xd) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) bind$netrom(r0, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@bcast, @default, @bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000000)={0xf9157ee2f64150b0, 0x1000}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000dda8000000ebe6a73a", @ANYRES32=r0, @ANYBLOB="f9ffffff000000002e2f66696c653000"]) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0xffff367d, &(0x7f0000000200)=0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x470040, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) r5 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10000, 0x141200) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20, 0x0, r1, {0x101, 0x4, 0x0, 0x6}}, 0x20) write$6lowpan_control(r0, &(0x7f00000002c0)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) ioctl$NBD_DO_IT(r0, 0xab03) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) bind$netrom(r0, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@bcast, @default, @bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000000)={0xf9157ee2f64150b0, 0x1000}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000dda8000000ebe6a73a", @ANYRES32=r0, @ANYBLOB="f9ffffff000000002e2f66696c653000"]) (async) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0xffff367d, &(0x7f0000000200)=0x4) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x470040, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async) syz_open_dev$vcsa(&(0x7f0000000240), 0x10000, 0x141200) (async) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20, 0x0, r1, {0x101, 0x4, 0x0, 0x6}}, 0x20) (async) write$6lowpan_control(r0, &(0x7f00000002c0)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) (async) ioctl$NBD_DO_IT(r0, 0xab03) (async) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x12, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xe2) (async) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) (async, rerun: 32) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r1) (rerun: 32) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[], 0xd) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x13, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'team_slave_0\x00'}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) bind$netrom(r0, &(0x7f0000000100)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@bcast, @default, @bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000000)={0xf9157ee2f64150b0, 0x1000}) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="010000dda8000000ebe6a73a", @ANYRES32=r0, @ANYBLOB="f9ffffff000000002e2f66696c653000"]) (async) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0xffff367d, &(0x7f0000000200)=0x4) (async) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x470040, 0x0) (async) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async) r5 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10000, 0x141200) write$FUSE_IOCTL(r5, &(0x7f0000000280)={0x20, 0x0, r1, {0x101, 0x4, 0x0, 0x6}}, 0x20) write$6lowpan_control(r0, &(0x7f00000002c0)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) (async) ioctl$NBD_DO_IT(r0, 0xab03) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x14, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[], 0xd) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x7) 00:45:48 executing program 4: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'team_slave_0\x00'}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'team_slave_0\x00'}}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x101, 0x0, 0x80000001, 0x1608, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r0, 0x2, 0x2, 0x2, 0xe}, 0x48) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000100)) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x80000000, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0xd) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x101, 0x0, 0x80000001, 0x1608, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r0, 0x2, 0x2, 0x2, 0xe}, 0x48) (async) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000100)) (async) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x80000000, 0x4) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x700) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x15, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'team_slave_0\x00'}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @empty, 'team_slave_0\x00'}}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x1000000) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0xd) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x16, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x3, 0x9}, 0x100, './file0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x101, 0x0, 0x80000001, 0x1608, 0xffffffffffffffff, 0x8000, '\x00', 0x0, r0, 0x2, 0x2, 0x2, 0xe}, 0x48) (async) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000100)) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x80000000, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x3, 0x9}, 0x100, './file0\x00'}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0xd) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x7000000) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x17, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xf8ffffff) 00:45:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r1, 0xffffffffffffffff, 0x3d) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03"], 0xd) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000040)={{0x3, 0x9}, 0x100, './file0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x18, 0x0, 0xffffffffffffffff, 0x0) [ 2748.456673][ T675] Bluetooth: unknown link type 126 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xf9ffffff) 00:45:48 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x14) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, 0xffffffffffffffff, 0x3d) 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xa2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x17, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) bind$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x3, &(0x7f0000000140)=0x4) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03"], 0xd) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x19, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x14) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfaffffff) [ 2748.513938][ T7866] Bluetooth: unknown link type 126 00:45:48 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r1, 0xffffffffffffffff, 0x3d) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, 0xffffffffffffffff, 0x3d) (async) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1a, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03"], 0xd) 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xa2) (async) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x17, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) bind$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x3, &(0x7f0000000140)=0x4) [ 2748.552506][ T675] Bluetooth: unknown link type 126 00:45:48 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x14) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfbffffff) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9a"], 0xd) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1b, 0x0, 0xffffffffffffffff, 0x0) [ 2748.594036][ T7866] Bluetooth: unknown link type 126 00:45:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9a"], 0xd) 00:45:48 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8, 0x1ff, 0x2}) socket(0x26, 0x800, 0x7) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @remote, @remote, @rose, @remote, @bcast, @null, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) [ 2748.619611][ T675] Bluetooth: unknown link type 126 00:45:48 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xa2) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x17, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) bind$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x3, &(0x7f0000000140)=0x4) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0xa2) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) socket$key(0xf, 0x3, 0x2) (async) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_kmaddress={0x8, 0x17, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x50}}, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) bind$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x3, &(0x7f0000000140)=0x4) (async) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfcffffff) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1c, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9a"], 0xd) 00:45:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:48 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8, 0x1ff, 0x2}) socket(0x26, 0x800, 0x7) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @remote, @remote, @rose, @remote, @bcast, @null, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) [ 2748.673428][ T7866] Bluetooth: unknown link type 126 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee"], 0xd) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfdffffff) 00:45:48 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8, 0x1ff, 0x2}) socket(0x26, 0x800, 0x7) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @remote, @remote, @rose, @remote, @bcast, @null, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x8, 0x1ff, 0x2}) (async) socket(0x26, 0x800, 0x7) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @remote, @remote, @rose, @remote, @bcast, @null, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) (async) 00:45:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) [ 2748.761348][ T675] Bluetooth: unknown link type 126 00:45:48 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "07ec3e5c19825da5bd23ec95f5c47984d68b958206b7b8b9ae4d62a7b76063f33902380792293ecb3f793bd46e63d4eaa7f8a4e5690c137e33cbcf5b3b255e0e", 0x3a}, 0x48, 0xfffffffffffffff8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161616161616161616161616161616161613131311131313131313131313131313131313131313131313182070000003131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "4183f2ffc4cb3a7b9d5510ccd629065d9c89b807b4712bb612b2058eb41331783be679937ea2b03a57693eee44bd70572899b76c70f9f92d907a3ce4dd4de080", 0x30}, 0x48, r0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) r5 = add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161616161616161616161616161616131313131313131313131313131313131313131313131314d798c1765eb4ee5e8482a313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r5) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r6, 0xc9) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee"], 0xd) [ 2748.799291][ T7866] Bluetooth: unknown link type 126 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000280)={0x0, 0x9}) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "9e723d342872ae6a8989c1d73eabcfd23e446eb9c0d48c73163b3735c409182384ec0c1d9cb4a0a01b69c0c09e49797d769a5f5fb5b0bee0515e0a08bf4c1eeb", 0x2a}, 0x48, 0xffffffffffffffff) add_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="93f286cdd9aa7aff7832f0a433932dde6c4d372dd307cd186f7447300c0d6e0bd7930a9a15adb5906d721341e6b5817b0f9070e1df521ab77b5b51fa7c62c86934b4f68dfee49949434b600c36d0c6773a4c", 0x52, r1) clock_gettime(0x5, &(0x7f0000000200)) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1d, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfeffffff) 00:45:48 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "07ec3e5c19825da5bd23ec95f5c47984d68b958206b7b8b9ae4d62a7b76063f33902380792293ecb3f793bd46e63d4eaa7f8a4e5690c137e33cbcf5b3b255e0e", 0x3a}, 0x48, 0xfffffffffffffff8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161616161616161616161616161616161613131311131313131313131313131313131313131313131313182070000003131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "4183f2ffc4cb3a7b9d5510ccd629065d9c89b807b4712bb612b2058eb41331783be679937ea2b03a57693eee44bd70572899b76c70f9f92d907a3ce4dd4de080", 0x30}, 0x48, r0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) r5 = add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161616161616161616161616161616131313131313131313131313131313131313131313131314d798c1765eb4ee5e8482a313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r5) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r6, 0xc9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "07ec3e5c19825da5bd23ec95f5c47984d68b958206b7b8b9ae4d62a7b76063f33902380792293ecb3f793bd46e63d4eaa7f8a4e5690c137e33cbcf5b3b255e0e", 0x3a}, 0x48, 0xfffffffffffffff8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161616161616161616161616161616161613131311131313131313131313131313131313131313131313182070000003131"], 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "4183f2ffc4cb3a7b9d5510ccd629065d9c89b807b4712bb612b2058eb41331783be679937ea2b03a57693eee44bd70572899b76c70f9f92d907a3ce4dd4de080", 0x30}, 0x48, r0) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) (async) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161616161616161616161616161616131313131313131313131313131313131313131313131314d798c1765eb4ee5e8482a313131313131313131"], 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r5) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r6, 0xc9) (async) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffff8) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x1e, 0x0, 0xffffffffffffffff, 0x0) 00:45:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x19, 0x1, 0xf9, 0x3, 0x281, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1853000006000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB='\x00'/15, @ANYRES32, @ANYBLOB="00000000000000006384fcff0000000018360000050000000000000000000000186300000a000000000000000800000018470000fcffffff0000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x80000001, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x7, 0x81}, 0x10, 0x0, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r2, r3, r4, r5, r0]}, 0x80) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee"], 0xd) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000280)={0x0, 0x9}) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "9e723d342872ae6a8989c1d73eabcfd23e446eb9c0d48c73163b3735c409182384ec0c1d9cb4a0a01b69c0c09e49797d769a5f5fb5b0bee0515e0a08bf4c1eeb", 0x2a}, 0x48, 0xffffffffffffffff) add_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="93f286cdd9aa7aff7832f0a433932dde6c4d372dd307cd186f7447300c0d6e0bd7930a9a15adb5906d721341e6b5817b0f9070e1df521ab77b5b51fa7c62c86934b4f68dfee49949434b600c36d0c6773a4c", 0x52, r1) (async) clock_gettime(0x5, &(0x7f0000000200)) 00:45:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x19, 0x1, 0xf9, 0x3, 0x281, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async, rerun: 32) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (rerun: 32) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1853000006000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB='\x00'/15, @ANYRES32, @ANYBLOB="00000000000000006384fcff0000000018360000050000000000000000000000186300000a000000000000000800000018470000fcffffff0000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x80000001, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x7, 0x81}, 0x10, 0x0, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r2, r3, r4, r5, r0]}, 0x80) [ 2748.913569][ T675] Bluetooth: unknown link type 126 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e"], 0xd) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x10) 00:45:48 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "07ec3e5c19825da5bd23ec95f5c47984d68b958206b7b8b9ae4d62a7b76063f33902380792293ecb3f793bd46e63d4eaa7f8a4e5690c137e33cbcf5b3b255e0e", 0x3a}, 0x48, 0xfffffffffffffff8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161616161616161616161616161616161613131311131313131313131313131313131313131313131313182070000003131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "4183f2ffc4cb3a7b9d5510ccd629065d9c89b807b4712bb612b2058eb41331783be679937ea2b03a57693eee44bd70572899b76c70f9f92d907a3ce4dd4de080", 0x30}, 0x48, r0) r3 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) r5 = add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161616161616161616161616161616131313131313131313131313131313131313131313131314d798c1765eb4ee5e8482a313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r5) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r6, 0xc9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "07ec3e5c19825da5bd23ec95f5c47984d68b958206b7b8b9ae4d62a7b76063f33902380792293ecb3f793bd46e63d4eaa7f8a4e5690c137e33cbcf5b3b255e0e", 0x3a}, 0x48, 0xfffffffffffffff8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000000000061616161616161616161616161616161616161616161616161616161616161613131311131313131313131313131313131313131313131313182070000003131"], 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "4183f2ffc4cb3a7b9d5510ccd629065d9c89b807b4712bb612b2058eb41331783be679937ea2b03a57693eee44bd70572899b76c70f9f92d907a3ce4dd4de080", 0x30}, 0x48, r0) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r3) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) (async) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161616161616161616161616161616131313131313131313131313131313131313131313131314d798c1765eb4ee5e8482a313131313131313131"], 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r5) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r6, 0xc9) (async) 00:45:48 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffff9) 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x100000) 00:45:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x19, 0x1, 0xf9, 0x3, 0x281, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1853000006000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB='\x00'/15, @ANYRES32, @ANYBLOB="00000000000000006384fcff0000000018360000050000000000000000000000186300000a000000000000000800000018470000fcffffff0000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x80000001, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x7, 0x81}, 0x10, 0x0, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r2, r3, r4, r5, r0]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x19, 0x1, 0xf9, 0x3, 0x281, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, 0x0) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="1853000006000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB='\x00'/15, @ANYRES32, @ANYBLOB="00000000000000006384fcff0000000018360000050000000000000000000000186300000a000000000000000800000018470000fcffffff0000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x80000001, 0x1, &(0x7f0000000180)=""/1, 0x41100, 0x10, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x10, 0x7, 0x81}, 0x10, 0x0, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r2, r3, r4, r5, r0]}, 0x80) (async) [ 2748.974389][ T7866] Bluetooth: unknown link type 126 00:45:48 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x1000000) 00:45:48 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_SET_GROUP_ASID(r0, 0x4008af7c, &(0x7f0000000280)={0x0, 0x9}) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "9e723d342872ae6a8989c1d73eabcfd23e446eb9c0d48c73163b3735c409182384ec0c1d9cb4a0a01b69c0c09e49797d769a5f5fb5b0bee0515e0a08bf4c1eeb", 0x2a}, 0x48, 0xffffffffffffffff) add_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="93f286cdd9aa7aff7832f0a433932dde6c4d372dd307cd186f7447300c0d6e0bd7930a9a15adb5906d721341e6b5817b0f9070e1df521ab77b5b51fa7c62c86934b4f68dfee49949434b600c36d0c6773a4c", 0x52, r1) clock_gettime(0x5, &(0x7f0000000200)) 00:45:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:48 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e"], 0xd) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffffa) [ 2749.046246][ T675] Bluetooth: unknown link type 126 00:45:49 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xf8ffffff) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x34) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xf9ffffff) 00:45:49 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 64) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) (rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e"], 0xd) 00:45:49 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x18, 0x4, 0x0, 0x6, 0x18a, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffffb) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x34) [ 2749.119255][ T7866] Bluetooth: unknown link type 126 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfaffffff) 00:45:49 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x800) 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600"], 0xd) 00:45:49 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x18, 0x4, 0x0, 0x6, 0x18a, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x18, 0x4, 0x0, 0x6, 0x18a, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) 00:45:49 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x800) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfbffffff) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffffc) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x34) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x34) (async) [ 2749.178003][ T675] Bluetooth: unknown link type 126 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600"], 0xd) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffffd) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfcffffff) 00:45:49 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x800) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x800) (async) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x9, 0x309800) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfffffffe) 00:45:49 executing program 4: r0 = syz_usb_connect$printer(0x4, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x65, 0x80, 0x5, [{{0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x1, 0x2, 0x79, "", {{{0x9, 0x5, 0x1, 0x2, 0x400, 0xd6, 0x1, 0x3f}}, [{{0x9, 0x5, 0x82, 0x2, 0x200, 0x8, 0xc8, 0x81}}]}}}]}}]}}, &(0x7f0000000a40)={0xa, &(0x7f0000000540)={0xa, 0x6, 0x201, 0x4, 0x6, 0x67, 0x10, 0xff}, 0x19, &(0x7f0000000580)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0xa0, "ecf47fcfb36275238b2b7e422e388aaf"}]}, 0xa, [{0x52, &(0x7f00000005c0)=@string={0x52, 0x3, "ae0dc4e00e5664f68f6870d070d998069ac99a7fc0b70be60120674e8ce609aa06d62a3139a6663df0e389527d639b0919f36b1bbabf35f5c40f928043a8f4ff2e345e7130c83328cbc07542264da417"}}, {0xca, &(0x7f0000000640)=@string={0xca, 0x3, "31d027590e0a279e8a51d6f673ec3e8974746f7257ca79480bc2180ea9d95695d9d6f5c6d8f0d50cb8a41350f9675583a8196e901633089cdf1c770088127329b5083669f44c684bf184dab66a3e1a4604d80f372723f379f24adc0fb238b611e426ab5c8dd75be55c923a72e59528a5052eef8459d1daffb0546ef35cef4296cda40860ada8a3c47c4ec68d3baab4a624d15105c0019e5cb2f73cab9f329643f3a983ba35874dc8fbcd9003ed41620d348caad7b4dab62595e254d1520a178b320a34853738f44c"}}, {0x101, &(0x7f0000000740)=@string={0x101, 0x3, "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"}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x813}}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x440a}}, {0x4, &(0x7f0000000900)=@lang_id={0x4, 0x3, 0x2809}}, {0x4, &(0x7f0000000940)=@lang_id={0x4}}, {0x3b, &(0x7f0000000980)=@string={0x3b, 0x3, "51d6ee4b267d7d8d815880e46c766abda8fb840d97e1f76301c451241b1ac1428252360f2a22cf8d35f81139424931b7657cefd0d06696613d"}}, {0x4, &(0x7f00000009c0)=@lang_id={0x4, 0x3, 0x4c0a}}, {0x4, &(0x7f0000000a00)=@lang_id={0x4, 0x3, 0xc45}}]}) syz_usb_control_io$printer(r0, &(0x7f0000000240)={0x14, &(0x7f0000000080)={0x20, 0xa, 0xa6, {0xa6, 0xd, "c8116467e6017175ead8d2695cb84691702448e0178fdacda171f9ea88252ba31bc4fb400d2b440987a2058d37485a092fa8b0378397dc79d0bcb470c08d07118a2ce4780fda0d6e026cebf28d91f4b23c377dc9967d3406afc600bff2b17d11dc389a012ad045d462f167660bf5cad703f9dfcc52f89b3fdb651c946a68de866bfeb52bf6a6cd63efec8577f2cbdacb69f4c298e6d0a8ada7002c586e0335dc328c3b34"}}, &(0x7f0000000140)={0x0, 0x3, 0xce, @string={0xce, 0x3, "55bc0aa8a0883e365b44ea8401b0b096c74cbb1d7c41462e8c62c731f5b6a16dacd560f309ae51c21cbcad7a3d6dc0e16cf9ad09ffee6436f1f5911b181747c19353e4d53f440ae8d525ef1fd663341687251dc4fa392a397388aaeef4d545a61f54d4a1f73538060bc635139b44d5560a1ef923038e98ecdf7ce990b4b0e9430f3ac7cd47f38beb6aa96ebd79b6714a3f0d619b23e64b5d496b5e3a4625abb051cbc46d9b9c01fd8b178353b3cbc13e59a0d888d03b44d8393996662088fba58520cad2c3f7f5310b9111b4"}}}, &(0x7f00000004c0)={0x34, &(0x7f0000000280)={0x20, 0x12, 0x93, "6477d7470e40bb4a6f966b3210093b4b198ff3f6d6c364deb13dee1314dfc1c6bce70ddd3f8ea5e1a122050424f76c59b61502f3a97bac74b430774f2646bcac5f6079888244ba9079b920da280432e19b96e261e76a7404ee6badbec1d33110a62ee4f37c37c0d9b4fcc53066078ad94f2ec82c581cbeda95108de979d7950ed811343adeece9a8612c9486a12c754ac91221"}, &(0x7f0000000340)={0x0, 0xa, 0x1, 0xfc}, &(0x7f0000000b00)={0x0, 0x8, 0x1, 0x3f}, &(0x7f00000003c0)={0x20, 0x0, 0x6f, {0x6d, "5b92869ba86da3b5185058c0613d57801f4976cf3127041f59e0938c12ee75a35824693e508512a5b905e3ba377e3aee018f55973337ca651262f3fe85c428b69911c2fd91ce61ac69201a512641ee2a6c9f6fa8effd6613b92c4c9f3df9d17bb1d35aa0294622f93c95c5e80e"}}, &(0x7f0000000440)={0x20, 0x1, 0x1, 0x4}, &(0x7f0000000480)={0x20, 0x0, 0x1, 0x4e}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 00:45:49 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async, rerun: 64) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x18, 0x4, 0x0, 0x6, 0x18a, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfdffffff) [ 2749.268503][ T7866] Bluetooth: unknown link type 126 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600"], 0xd) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x9, 0x309800) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000000000000000400000100000006000000090000000700000001000000ffffffff03000000b13200007f00000008000000ff0700000800000004000000ff01008e02000000080000000900000004000000040000005c05000000c00000faffffff4700000000040000a0090000010000000000649a3d000009000000040000000200000000000000ff0000000200000000000000ff030000030000000100000049000000000000000008000007000000aae2a129010000000010000001000000000001000600000000000000ffff000006000000040000003b670000ff0f000007000000020000008dd20000000000004000000000800000ffffffff810000000300000000f0ffff01000000050000000600000006000000030000000900000006000000050000009300000007000000a40100000000e00008000000b7d80000060000000002000007000000b507000007000000b70000000002000064010000760f00000000000003000000070000007f00000007000000ff7f0000aa08000000000000ff0f0000040000003f00000005000000"]) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x9, 0x309800) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000000000000000400000100000006000000090000000700000001000000ffffffff03000000b13200007f00000008000000ff0700000800000004000000ff01008e02000000080000000900000004000000040000005c05000000c00000faffffff4700000000040000a0090000010000000000649a3d000009000000040000000200000000000000ff0000000200000000000000ff030000030000000100000049000000000000000008000007000000aae2a129010000000010000001000000000001000600000000000000ffff000006000000040000003b670000ff0f000007000000020000008dd20000000000004000000000800000ffffffff810000000300000000f0ffff01000000050000000600000006000000030000000900000006000000050000009300000007000000a40100000000e00008000000b7d80000060000000002000007000000b507000007000000b70000000002000064010000760f00000000000003000000070000007f00000007000000ff7f0000aa08000000000000ff0f0000040000003f00000005000000"]) (async) 00:45:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfeffffff) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x100000000000000) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x9, 0x309800) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000200)=ANY=[@ANYBLOB="0900000000000000000400000100000006000000090000000700000001000000ffffffff03000000b13200007f00000008000000ff0700000800000004000000ff01008e02000000080000000900000004000000040000005c05000000c00000faffffff4700000000040000a0090000010000000000649a3d000009000000040000000200000000000000ff0000000200000000000000ff030000030000000100000049000000000000000008000007000000aae2a129010000000010000001000000000001000600000000000000ffff000006000000040000003b670000ff0f000007000000020000008dd20000000000004000000000800000ffffffff810000000300000000f0ffff01000000050000000600000006000000030000000900000006000000050000009300000007000000a40100000000e00008000000b7d80000060000000002000007000000b507000007000000b70000000002000064010000760f00000000000003000000070000007f00000007000000ff7f0000aa08000000000000ff0f0000040000003f00000005000000"]) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000000000000) [ 2749.350528][ T675] Bluetooth: unknown link type 126 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x700000000000000) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffff8) [ 2749.606176][T29642] Bluetooth: hci4: command 0x201b tx timeout 00:45:49 executing program 4: r0 = syz_usb_connect$printer(0x4, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x65, 0x80, 0x5, [{{0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x1, 0x2, 0x79, "", {{{0x9, 0x5, 0x1, 0x2, 0x400, 0xd6, 0x1, 0x3f}}, [{{0x9, 0x5, 0x82, 0x2, 0x200, 0x8, 0xc8, 0x81}}]}}}]}}]}}, &(0x7f0000000a40)={0xa, &(0x7f0000000540)={0xa, 0x6, 0x201, 0x4, 0x6, 0x67, 0x10, 0xff}, 0x19, &(0x7f0000000580)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0xa0, "ecf47fcfb36275238b2b7e422e388aaf"}]}, 0xa, [{0x52, &(0x7f00000005c0)=@string={0x52, 0x3, "ae0dc4e00e5664f68f6870d070d998069ac99a7fc0b70be60120674e8ce609aa06d62a3139a6663df0e389527d639b0919f36b1bbabf35f5c40f928043a8f4ff2e345e7130c83328cbc07542264da417"}}, {0xca, &(0x7f0000000640)=@string={0xca, 0x3, "31d027590e0a279e8a51d6f673ec3e8974746f7257ca79480bc2180ea9d95695d9d6f5c6d8f0d50cb8a41350f9675583a8196e901633089cdf1c770088127329b5083669f44c684bf184dab66a3e1a4604d80f372723f379f24adc0fb238b611e426ab5c8dd75be55c923a72e59528a5052eef8459d1daffb0546ef35cef4296cda40860ada8a3c47c4ec68d3baab4a624d15105c0019e5cb2f73cab9f329643f3a983ba35874dc8fbcd9003ed41620d348caad7b4dab62595e254d1520a178b320a34853738f44c"}}, {0x101, &(0x7f0000000740)=@string={0x101, 0x3, "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"}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x813}}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x440a}}, {0x4, &(0x7f0000000900)=@lang_id={0x4, 0x3, 0x2809}}, {0x4, &(0x7f0000000940)=@lang_id={0x4}}, {0x3b, &(0x7f0000000980)=@string={0x3b, 0x3, "51d6ee4b267d7d8d815880e46c766abda8fb840d97e1f76301c451241b1ac1428252360f2a22cf8d35f81139424931b7657cefd0d06696613d"}}, {0x4, &(0x7f00000009c0)=@lang_id={0x4, 0x3, 0x4c0a}}, {0x4, &(0x7f0000000a00)=@lang_id={0x4, 0x3, 0xc45}}]}) syz_usb_control_io$printer(r0, &(0x7f0000000240)={0x14, &(0x7f0000000080)={0x20, 0xa, 0xa6, {0xa6, 0xd, "c8116467e6017175ead8d2695cb84691702448e0178fdacda171f9ea88252ba31bc4fb400d2b440987a2058d37485a092fa8b0378397dc79d0bcb470c08d07118a2ce4780fda0d6e026cebf28d91f4b23c377dc9967d3406afc600bff2b17d11dc389a012ad045d462f167660bf5cad703f9dfcc52f89b3fdb651c946a68de866bfeb52bf6a6cd63efec8577f2cbdacb69f4c298e6d0a8ada7002c586e0335dc328c3b34"}}, &(0x7f0000000140)={0x0, 0x3, 0xce, @string={0xce, 0x3, "55bc0aa8a0883e365b44ea8401b0b096c74cbb1d7c41462e8c62c731f5b6a16dacd560f309ae51c21cbcad7a3d6dc0e16cf9ad09ffee6436f1f5911b181747c19353e4d53f440ae8d525ef1fd663341687251dc4fa392a397388aaeef4d545a61f54d4a1f73538060bc635139b44d5560a1ef923038e98ecdf7ce990b4b0e9430f3ac7cd47f38beb6aa96ebd79b6714a3f0d619b23e64b5d496b5e3a4625abb051cbc46d9b9c01fd8b178353b3cbc13e59a0d888d03b44d8393996662088fba58520cad2c3f7f5310b9111b4"}}}, &(0x7f00000004c0)={0x34, &(0x7f0000000280)={0x20, 0x12, 0x93, "6477d7470e40bb4a6f966b3210093b4b198ff3f6d6c364deb13dee1314dfc1c6bce70ddd3f8ea5e1a122050424f76c59b61502f3a97bac74b430774f2646bcac5f6079888244ba9079b920da280432e19b96e261e76a7404ee6badbec1d33110a62ee4f37c37c0d9b4fcc53066078ad94f2ec82c581cbeda95108de979d7950ed811343adeece9a8612c9486a12c754ac91221"}, &(0x7f0000000340)={0x0, 0xa, 0x1, 0xfc}, &(0x7f0000000b00)={0x0, 0x8, 0x1, 0x3f}, &(0x7f00000003c0)={0x20, 0x0, 0x6f, {0x6d, "5b92869ba86da3b5185058c0613d57801f4976cf3127041f59e0938c12ee75a35824693e508512a5b905e3ba377e3aee018f55973337ca651262f3fe85c428b69911c2fd91ce61ac69201a512641ee2a6c9f6fa8effd6613b92c4c9f3df9d17bb1d35aa0294622f93c95c5e80e"}}, &(0x7f0000000440)={0x20, 0x1, 0x1, 0x4}, &(0x7f0000000480)={0x20, 0x0, 0x1, 0x4e}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600000000"], 0xd) 00:45:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) (async) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000000000000) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xf8ffffff00000000) 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffff9) 00:45:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:49 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xf9ffffff00000000) [ 2749.782091][ T7866] Bluetooth: unknown link type 126 00:45:49 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffffa) 00:45:49 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000000000000) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000000000000) (async) 00:45:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600000000"], 0xd) [ 2749.817554][ T675] Bluetooth: unknown link type 126 00:45:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0xfffffffffffffcce) 00:45:50 executing program 4: r0 = syz_usb_connect$printer(0x4, 0x36, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x65, 0x80, 0x5, [{{0x9, 0x4, 0x0, 0x1, 0x2, 0x7, 0x1, 0x2, 0x79, "", {{{0x9, 0x5, 0x1, 0x2, 0x400, 0xd6, 0x1, 0x3f}}, [{{0x9, 0x5, 0x82, 0x2, 0x200, 0x8, 0xc8, 0x81}}]}}}]}}]}}, &(0x7f0000000a40)={0xa, &(0x7f0000000540)={0xa, 0x6, 0x201, 0x4, 0x6, 0x67, 0x10, 0xff}, 0x19, &(0x7f0000000580)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0xa0, "ecf47fcfb36275238b2b7e422e388aaf"}]}, 0xa, [{0x52, &(0x7f00000005c0)=@string={0x52, 0x3, "ae0dc4e00e5664f68f6870d070d998069ac99a7fc0b70be60120674e8ce609aa06d62a3139a6663df0e389527d639b0919f36b1bbabf35f5c40f928043a8f4ff2e345e7130c83328cbc07542264da417"}}, {0xca, &(0x7f0000000640)=@string={0xca, 0x3, "31d027590e0a279e8a51d6f673ec3e8974746f7257ca79480bc2180ea9d95695d9d6f5c6d8f0d50cb8a41350f9675583a8196e901633089cdf1c770088127329b5083669f44c684bf184dab66a3e1a4604d80f372723f379f24adc0fb238b611e426ab5c8dd75be55c923a72e59528a5052eef8459d1daffb0546ef35cef4296cda40860ada8a3c47c4ec68d3baab4a624d15105c0019e5cb2f73cab9f329643f3a983ba35874dc8fbcd9003ed41620d348caad7b4dab62595e254d1520a178b320a34853738f44c"}}, {0x101, &(0x7f0000000740)=@string={0x101, 0x3, "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"}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x813}}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x440a}}, {0x4, &(0x7f0000000900)=@lang_id={0x4, 0x3, 0x2809}}, {0x4, &(0x7f0000000940)=@lang_id={0x4}}, {0x3b, &(0x7f0000000980)=@string={0x3b, 0x3, "51d6ee4b267d7d8d815880e46c766abda8fb840d97e1f76301c451241b1ac1428252360f2a22cf8d35f81139424931b7657cefd0d06696613d"}}, {0x4, &(0x7f00000009c0)=@lang_id={0x4, 0x3, 0x4c0a}}, {0x4, &(0x7f0000000a00)=@lang_id={0x4, 0x3, 0xc45}}]}) syz_usb_control_io$printer(r0, &(0x7f0000000240)={0x14, &(0x7f0000000080)={0x20, 0xa, 0xa6, {0xa6, 0xd, "c8116467e6017175ead8d2695cb84691702448e0178fdacda171f9ea88252ba31bc4fb400d2b440987a2058d37485a092fa8b0378397dc79d0bcb470c08d07118a2ce4780fda0d6e026cebf28d91f4b23c377dc9967d3406afc600bff2b17d11dc389a012ad045d462f167660bf5cad703f9dfcc52f89b3fdb651c946a68de866bfeb52bf6a6cd63efec8577f2cbdacb69f4c298e6d0a8ada7002c586e0335dc328c3b34"}}, &(0x7f0000000140)={0x0, 0x3, 0xce, @string={0xce, 0x3, "55bc0aa8a0883e365b44ea8401b0b096c74cbb1d7c41462e8c62c731f5b6a16dacd560f309ae51c21cbcad7a3d6dc0e16cf9ad09ffee6436f1f5911b181747c19353e4d53f440ae8d525ef1fd663341687251dc4fa392a397388aaeef4d545a61f54d4a1f73538060bc635139b44d5560a1ef923038e98ecdf7ce990b4b0e9430f3ac7cd47f38beb6aa96ebd79b6714a3f0d619b23e64b5d496b5e3a4625abb051cbc46d9b9c01fd8b178353b3cbc13e59a0d888d03b44d8393996662088fba58520cad2c3f7f5310b9111b4"}}}, &(0x7f00000004c0)={0x34, &(0x7f0000000280)={0x20, 0x12, 0x93, "6477d7470e40bb4a6f966b3210093b4b198ff3f6d6c364deb13dee1314dfc1c6bce70ddd3f8ea5e1a122050424f76c59b61502f3a97bac74b430774f2646bcac5f6079888244ba9079b920da280432e19b96e261e76a7404ee6badbec1d33110a62ee4f37c37c0d9b4fcc53066078ad94f2ec82c581cbeda95108de979d7950ed811343adeece9a8612c9486a12c754ac91221"}, &(0x7f0000000340)={0x0, 0xa, 0x1, 0xfc}, &(0x7f0000000b00)={0x0, 0x8, 0x1, 0x3f}, &(0x7f00000003c0)={0x20, 0x0, 0x6f, {0x6d, "5b92869ba86da3b5185058c0613d57801f4976cf3127041f59e0938c12ee75a35824693e508512a5b905e3ba377e3aee018f55973337ca651262f3fe85c428b69911c2fd91ce61ac69201a512641ee2a6c9f6fa8effd6613b92c4c9f3df9d17bb1d35aa0294622f93c95c5e80e"}}, &(0x7f0000000440)={0x20, 0x1, 0x1, 0x4}, &(0x7f0000000480)={0x20, 0x0, 0x1, 0x4e}}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) bind$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 00:45:50 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc5784600000000"], 0xd) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffffb) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfaffffff00000000) 00:45:50 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r8, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r9, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r11, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r12 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r9, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r10, r12, 0xfe, 0xfffffff7}}}, 0x78) r13 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="90020000feffffff", @ANYRES64=r1, @ANYBLOB="0600000000000000000000000000000000000000402000001f0000000000000000000000147800000200000000000000010000000000000001000080000000007f000000000000000900000000000000fb0000000000000000000000ff0f0000ff0f00000040000001000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0010000006000000000000000000000000000000090000000000000004000000040000002d80270000000000020000000000000000000000000000000400000000000000050000000000000000070000060000000200000000000000400000000000000000000000010000001f0000000000000007000000000000000010000000000000ff7f000080000000ffffff7f0040000000080000", @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0080000005000000000000000400000000000000ffffff7f000000000100000000000100260000000000000003000000000000000300000000000000010000000000000094a50000000000000300000004000000050000000000000080000000000000003f00000000000000c1ffffffffffffff040000000000000007000000000000000010000070000000000040000080000046080000", @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r2, @ANYRES32=r13, @ANYBLOB="090000000600000000000000040000000000000004000000000000000400000000020000292d2d2900000000"], 0x290) write$FUSE_DIRENT(r0, &(0x7f0000002080)={0x50, 0xfffffffffffffff5, r1, [{0x1, 0x2, 0x4, 0x1000, ')--)'}, {0x3, 0x7fff, 0x1, 0xbe, '&'}]}, 0x50) 00:45:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0xfffffffffffffcce) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffffc) 00:45:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0xfffffffffffffcce) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfbffffff00000000) [ 2750.342510][ T7866] Bluetooth: unknown link type 126 00:45:50 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc578460000000000"], 0xd) 00:45:50 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) (async, rerun: 32) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (rerun: 32) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) read$FUSE(r8, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r9, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r11, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r12 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r9, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r10, r12, 0xfe, 0xfffffff7}}}, 0x78) r13 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="90020000feffffff", @ANYRES64=r1, @ANYBLOB="0600000000000000000000000000000000000000402000001f0000000000000000000000147800000200000000000000010000000000000001000080000000007f000000000000000900000000000000fb0000000000000000000000ff0f0000ff0f00000040000001000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0010000006000000000000000000000000000000090000000000000004000000040000002d80270000000000020000000000000000000000000000000400000000000000050000000000000000070000060000000200000000000000400000000000000000000000010000001f0000000000000007000000000000000010000000000000ff7f000080000000ffffff7f0040000000080000", @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0080000005000000000000000400000000000000ffffff7f000000000100000000000100260000000000000003000000000000000300000000000000010000000000000094a50000000000000300000004000000050000000000000080000000000000003f00000000000000c1ffffffffffffff040000000000000007000000000000000010000070000000000040000080000046080000", @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r2, @ANYRES32=r13, @ANYBLOB="090000000600000000000000040000000000000004000000000000000400000000020000292d2d2900000000"], 0x290) (async) write$FUSE_DIRENT(r0, &(0x7f0000002080)={0x50, 0xfffffffffffffff5, r1, [{0x1, 0x2, 0x4, 0x1000, ')--)'}, {0x3, 0x7fff, 0x1, 0xbe, '&'}]}, 0x50) [ 2750.392683][ T675] Bluetooth: unknown link type 126 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffffd) 00:45:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xc8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40180, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x1) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfcffffff00000000) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfffffffe) 00:45:50 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc578460000000000"], 0xd) 00:45:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r4) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3ff}, @jmp={0x5, 0x1, 0x4, 0x5, 0x4, 0xffffffffffffffff, 0x8}, @ldst={0x1, 0x3, 0x0, 0x7, 0x8, 0xc, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x34b, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, r3, r0]}, 0x80) 00:45:50 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00', @ANYRES32=0xffffffffffffffff, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async, rerun: 32) r7 = getegid() (rerun: 32) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) (async) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r8, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) read$FUSE(r8, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r9, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r11, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r12 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r9, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r10, r12, 0xfe, 0xfffffff7}}}, 0x78) (async) r13 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000044c0)=ANY=[@ANYBLOB="90020000feffffff", @ANYRES64=r1, @ANYBLOB="0600000000000000000000000000000000000000402000001f0000000000000000000000147800000200000000000000010000000000000001000080000000007f000000000000000900000000000000fb0000000000000000000000ff0f0000ff0f00000040000001000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0010000006000000000000000000000000000000090000000000000004000000040000002d80270000000000020000000000000000000000000000000400000000000000050000000000000000070000060000000200000000000000400000000000000000000000010000001f0000000000000007000000000000000010000000000000ff7f000080000000ffffff7f0040000000080000", @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="0080000005000000000000000400000000000000ffffff7f000000000100000000000100260000000000000003000000000000000300000000000000010000000000000094a50000000000000300000004000000050000000000000080000000000000003f00000000000000c1ffffffffffffff040000000000000007000000000000000010000070000000000040000080000046080000", @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r2, @ANYRES32=r13, @ANYBLOB="090000000600000000000000040000000000000004000000000000000400000000020000292d2d2900000000"], 0x290) write$FUSE_DIRENT(r0, &(0x7f0000002080)={0x50, 0xfffffffffffffff5, r1, [{0x1, 0x2, 0x4, 0x1000, ')--)'}, {0x3, 0x7fff, 0x1, 0xbe, '&'}]}, 0x50) [ 2750.848919][ T7866] Bluetooth: unknown link type 126 00:45:50 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, 'hsr0\x00'}}, 0x1e) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$SIOCNRDECOBS(r2, 0x89e2) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04040a3300080000006ba3777e0468b3780175768ee70bf1a92ae31e9b851cc034b21fdcba6cd8e09400d76a11dd9182efdefb37f6f30dd27f227e879e3d41e3e62a9621820ffc7edbb731fd5e61b7c4a2ac03942550ed8540e29a4345a46d1721ef6ea8b495a9a1354d12b8e4d94d380ace92064b3892b61452c49d9ab395ff89c0bf8c647397d69f546f34f3502ea8b9ee21b5738f3854b419e98e4bc578460000000000"], 0xd) 00:45:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xc8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40180, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x1) [ 2750.882362][ T675] Bluetooth: unknown link type 126 00:45:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r4) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3ff}, @jmp={0x5, 0x1, 0x4, 0x5, 0x4, 0xffffffffffffffff, 0x8}, @ldst={0x1, 0x3, 0x0, 0x7, 0x8, 0xc, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x34b, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, r3, r0]}, 0x80) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x10000000000000) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfdffffff00000000) 00:45:50 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r1, 0xfffffffffffffffc) 00:45:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r4) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3ff}, @jmp={0x5, 0x1, 0x4, 0x5, 0x4, 0xffffffffffffffff, 0x8}, @ldst={0x1, 0x3, 0x0, 0x7, 0x8, 0xc, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x34b, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, r3, r0]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r4) (async) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3ff}, @jmp={0x5, 0x1, 0x4, 0x5, 0x4, 0xffffffffffffffff, 0x8}, @ldst={0x1, 0x3, 0x0, 0x7, 0x8, 0xc, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x34b, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000001c0)=[0x1, r3, r0]}, 0x80) (async) 00:45:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:50 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0xc8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40180, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x1) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x100000000000000) 00:45:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xfeffffff00000000) 00:45:50 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x900) 00:45:50 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r1, 0xfffffffffffffffc) 00:45:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, r0, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:50 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, @short={0x2, 0x3, 0xaaa2}}, 0x14, &(0x7f0000000040)={&(0x7f0000000100)="b388e486aaa83f11d8f0ddcea076fa769216a1fbbb2952c178177281d05a5f6e793efc07fde759100c1fbad291d75770b3d45fec7541c262f437c2c3b9104b9fcaeba56c2d6d6f52d143ccc50e3ab1183b488c58645f72adf6c878d75dce79d372d5d480535dc0d1347c25481070f9d2e242db716b26ed1812a90f5922d904139fd2bdfd72cb2dd2e3dc706070647fdfe8dabab0c3abdab5e477788aba1acc1d56615b392b512e8c5dabde3464286b742895ba5a93", 0xb5}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x1d10, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:50 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xffffffff00000000) 00:45:50 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xf8ffffff00000000) 00:45:51 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x900) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x900) (async) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0xb4bd, 0xdec7, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r1, 0xfffffffffffffffc) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r1, 0xfffffffffffffffc) (async) 00:45:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, @short={0x2, 0x3, 0xaaa2}}, 0x14, &(0x7f0000000040)={&(0x7f0000000100)="b388e486aaa83f11d8f0ddcea076fa769216a1fbbb2952c178177281d05a5f6e793efc07fde759100c1fbad291d75770b3d45fec7541c262f437c2c3b9104b9fcaeba56c2d6d6f52d143ccc50e3ab1183b488c58645f72adf6c878d75dce79d372d5d480535dc0d1347c25481070f9d2e242db716b26ed1812a90f5922d904139fd2bdfd72cb2dd2e3dc706070647fdfe8dabab0c3abdab5e477788aba1acc1d56615b392b512e8c5dabde3464286b742895ba5a93", 0xb5}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x1d10, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, @short={0x2, 0x3, 0xaaa2}}, 0x14, &(0x7f0000000040)={&(0x7f0000000100)="b388e486aaa83f11d8f0ddcea076fa769216a1fbbb2952c178177281d05a5f6e793efc07fde759100c1fbad291d75770b3d45fec7541c262f437c2c3b9104b9fcaeba56c2d6d6f52d143ccc50e3ab1183b488c58645f72adf6c878d75dce79d372d5d480535dc0d1347c25481070f9d2e242db716b26ed1812a90f5922d904139fd2bdfd72cb2dd2e3dc706070647fdfe8dabab0c3abdab5e477788aba1acc1d56615b392b512e8c5dabde3464286b742895ba5a93", 0xb5}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x1d10, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:45:51 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xfffffffc}}, './file0\x00'}) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, 0x0, &(0x7f0000000040)) write$FUSE_ATTR(r4, &(0x7f0000000140)={0x78, 0x0, r1, {0x4, 0x82, 0x0, {0x2, 0x2, 0xffffffffffff44a3, 0x2, 0x81, 0x4, 0x3, 0x4, 0x8001, 0x2000, 0x12693f4f, r2, r3, 0x401, 0x1}}}, 0x78) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xf9ffffff00000000) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:51 executing program 4: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x900) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x29) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfaffffff00000000) 00:45:51 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xfffffffc}}, './file0\x00'}) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, 0x0, &(0x7f0000000040)) write$FUSE_ATTR(r4, &(0x7f0000000140)={0x78, 0x0, r1, {0x4, 0x82, 0x0, {0x2, 0x2, 0xffffffffffff44a3, 0x2, 0x81, 0x4, 0x3, 0x4, 0x8001, 0x2000, 0x12693f4f, r2, r3, 0x401, 0x1}}}, 0x78) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xfffffffc}}, './file0\x00'}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, 0x0, &(0x7f0000000040)) (async) write$FUSE_ATTR(r4, &(0x7f0000000140)={0x78, 0x0, r1, {0x4, 0x82, 0x0, {0x2, 0x2, 0xffffffffffff44a3, 0x2, 0x81, 0x4, 0x3, 0x4, 0x8001, 0x2000, 0x12693f4f, r2, r3, 0x401, 0x1}}}, 0x78) (async) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, @short={0x2, 0x3, 0xaaa2}}, 0x14, &(0x7f0000000040)={&(0x7f0000000100)="b388e486aaa83f11d8f0ddcea076fa769216a1fbbb2952c178177281d05a5f6e793efc07fde759100c1fbad291d75770b3d45fec7541c262f437c2c3b9104b9fcaeba56c2d6d6f52d143ccc50e3ab1183b488c58645f72adf6c878d75dce79d372d5d480535dc0d1347c25481070f9d2e242db716b26ed1812a90f5922d904139fd2bdfd72cb2dd2e3dc706070647fdfe8dabab0c3abdab5e477788aba1acc1d56615b392b512e8c5dabde3464286b742895ba5a93", 0xb5}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x1d10, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:51 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, &(0x7f00000001c0)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xdd) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfbffffff00000000) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x29) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x29) (async) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfcffffff00000000) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:45:51 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, &(0x7f00000001c0)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xdd) 00:45:51 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xfffffffc}}, './file0\x00'}) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, 0x0, &(0x7f0000000040)) (async, rerun: 32) write$FUSE_ATTR(r4, &(0x7f0000000140)={0x78, 0x0, r1, {0x4, 0x82, 0x0, {0x2, 0x2, 0xffffffffffff44a3, 0x2, 0x81, 0x4, 0x3, 0x4, 0x8001, 0x2000, 0x12693f4f, r2, r3, 0x401, 0x1}}}, 0x78) (async, rerun: 32) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x29) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0xb4bd, 0xdec7, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfdffffff00000000) 00:45:51 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, &(0x7f00000001c0)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xdd) 00:45:51 executing program 1: fsopen(0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fffffffffffffff, 0x4000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3, 0x2, 0x8}) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x11f542) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0xd) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0xb4bd, 0xdec7, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xfeffffff00000000) 00:45:51 executing program 1: fsopen(0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fffffffffffffff, 0x4000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3, 0x2, 0x8}) fsopen(0x0, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x7fffffffffffffff, 0x4000) (async) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3, 0x2, 0x8}) (async) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x11f542) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 64) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0xd) (rerun: 64) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0xb4bd, 0xdec7, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x400000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_CREATE_OPEN(r1, &(0x7f0000004240)={0xa0, 0xffffffffffffffda, 0x0, {{0x5, 0xfd, 0xffff, 0x3, 0x2, 0x10001, {0x1, 0x8000000000000001, 0x400, 0x5, 0x4, 0x101, 0x2dc, 0x9, 0x66, 0x6000, 0x80, 0x0, r7, 0x101, 0x1f}}, {0x0, 0x1d}}}, 0xa0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xa76) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xffffffff00000000) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x11f542) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0xd) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x0, 0x4}, 0x100, './file0\x00'}) 00:45:51 executing program 1: fsopen(0x0, 0x0) (async, rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x100000) (async, rerun: 64) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fffffffffffffff, 0x4000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3, 0x2, 0x8}) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0xdec7, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:45:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x400000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_CREATE_OPEN(r1, &(0x7f0000004240)={0xa0, 0xffffffffffffffda, 0x0, {{0x5, 0xfd, 0xffff, 0x3, 0x2, 0x10001, {0x1, 0x8000000000000001, 0x400, 0x5, 0x4, 0x101, 0x2dc, 0x9, 0x66, 0x6000, 0x80, 0x0, r7, 0x101, 0x1f}}, {0x0, 0x1d}}}, 0xa0) (async) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xa76) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x0, 0x4}, 0x100, './file0\x00'}) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) (async) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x0, 0x7, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) 00:45:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x400000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_CREATE_OPEN(r1, &(0x7f0000004240)={0xa0, 0xffffffffffffffda, 0x0, {{0x5, 0xfd, 0xffff, 0x3, 0x2, 0x10001, {0x1, 0x8000000000000001, 0x400, 0x5, 0x4, 0x101, 0x2dc, 0x9, 0x66, 0x6000, 0x80, 0x0, r7, 0x101, 0x1f}}, {0x0, 0x1d}}}, 0xa0) (async) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xa76) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x0, 0x4}, 0x100, './file0\x00'}) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x0, 0x0, 0x1048, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x2) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x1, r1}) 00:45:51 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="74756e6c3000000000000000000000003ecec1183df10700a2d229674aa61f4363f3df88346d6b5b9c80d34bbd54a5f3ff6a8b4e41baf2d97efcdc9ed640abb0ef956817a49e7e3fb1e38a1431235b4a23ef25beb1ab19ad6d4c94f6c88b860d8b4be87de060d40deae6efbf4022ebd6ceea45cb6c6d285e0286482bd1a219ed972483e77f58b51c2dcecb745edea0b0d0ba2a2cbff948e28b7719ef724105c1e10ca3b913627a3ff20f32488df690955769df9e0a80ef1b32a94ad13ccb2d91731dd4ec4e5f781d53c8b7c4e5b5f8c37a9895a0b9228c2432fc07455e938770c39cff57392af73ce8ae68f0da37db43", @ANYRES32=0x0, @ANYBLOB="8000780000000000000001ff4d1c003400650000022f9078ac1414bbac14142f441c8863ac1414aa00000007e000000200000101e00000020000000094040100"]}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x9, 0x0, 0x80, 0x1, 0x0, '\x00', r0, r1, 0x0, 0x0, 0x5}, 0x48) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mq_getsetattr(r5, &(0x7f0000000140)={0x527f, 0x9, 0x9, 0x35f2}, &(0x7f0000000180)) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"/492], 0x180}}, 0x8000) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x63) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x11) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/241, 0xf1) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xadf, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) 00:45:51 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) (async) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x63) (async, rerun: 32) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x11) (async, rerun: 32) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/241, 0xf1) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x2) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x1, r1}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x2) (async) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x1, r1}) (async) 00:45:51 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="74756e6c3000000000000000000000003ecec1183df10700a2d229674aa61f4363f3df88346d6b5b9c80d34bbd54a5f3ff6a8b4e41baf2d97efcdc9ed640abb0ef956817a49e7e3fb1e38a1431235b4a23ef25beb1ab19ad6d4c94f6c88b860d8b4be87de060d40deae6efbf4022ebd6ceea45cb6c6d285e0286482bd1a219ed972483e77f58b51c2dcecb745edea0b0d0ba2a2cbff948e28b7719ef724105c1e10ca3b913627a3ff20f32488df690955769df9e0a80ef1b32a94ad13ccb2d91731dd4ec4e5f781d53c8b7c4e5b5f8c37a9895a0b9228c2432fc07455e938770c39cff57392af73ce8ae68f0da37db43", @ANYRES32=0x0, @ANYBLOB="8000780000000000000001ff4d1c003400650000022f9078ac1414bbac14142f441c8863ac1414aa00000007e000000200000101e00000020000000094040100"]}) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x9, 0x0, 0x80, 0x1, 0x0, '\x00', r0, r1, 0x0, 0x0, 0x5}, 0x48) (async) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mq_getsetattr(r5, &(0x7f0000000140)={0x527f, 0x9, 0x9, 0x35f2}, &(0x7f0000000180)) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) (async) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="02130208300000002500fedbdf2501001400000000002100180005abfc00fb2e5961700b967e9a33e2673fb50b4dc917d078e25854d84207c5c8e1ffbedc5643f8ae75a5d3a28dcb0863e0442baafefa04cb334cb8d1fb96d8256674111983bbba053325f9adb967f64629438d9ab5c24f193af398c066e02afebd2646a9ab1563a72823d19d20fca87f1df5535c1d8db5e47e53ea1091d8cc066e5a6bd1323fc7d9bf60c0b485efe57ee6af2e50dfadce65c73ec6009e7a4c9b15e640b32b52428c79ec0ca17b14b48939e31b94ae083f304689259cfacda6a1020ea077676169fa824a12656e337d63e815e64b2ab60a723f0343454ed302bf52ddd00259ebddd533710d1f460afd6b9c4a852a4df0bc648f83683596000000000400040000000000030000000000000008000000000000000400f5000100000001001620000002000100000004d67f072f03010000500300170033a0000002004e24e0000002000000000000000002000a00000000000300000000000000dc4331ba4b3afaa5eb9cf7e1f10b62343b0800989cf06558bfe6764c1a718699c6967c118ffffc7c988a9e3ea6ec13977367d347fe39f44ba726c7baec09ca1681ead97871cba0f0289be49d113704716ac129859d4d503d4ec52e42b0ac6c215be500"/492], 0x180}}, 0x8000) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x63) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x11) (async) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/241, 0xf1) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) 00:45:51 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="74756e6c3000000000000000000000003ecec1183df10700a2d229674aa61f4363f3df88346d6b5b9c80d34bbd54a5f3ff6a8b4e41baf2d97efcdc9ed640abb0ef956817a49e7e3fb1e38a1431235b4a23ef25beb1ab19ad6d4c94f6c88b860d8b4be87de060d40deae6efbf4022ebd6ceea45cb6c6d285e0286482bd1a219ed972483e77f58b51c2dcecb745edea0b0d0ba2a2cbff948e28b7719ef724105c1e10ca3b913627a3ff20f32488df690955769df9e0a80ef1b32a94ad13ccb2d91731dd4ec4e5f781d53c8b7c4e5b5f8c37a9895a0b9228c2432fc07455e938770c39cff57392af73ce8ae68f0da37db43", @ANYRES32=0x0, @ANYBLOB="8000780000000000000001ff4d1c003400650000022f9078ac1414bbac14142f441c8863ac1414aa00000007e000000200000101e00000020000000094040100"]}) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x9, 0x0, 0x80, 0x1, 0x0, '\x00', r0, r1, 0x0, 0x0, 0x5}, 0x48) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mq_getsetattr(r5, &(0x7f0000000140)={0x527f, 0x9, 0x9, 0x35f2}, &(0x7f0000000180)) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"/492], 0x180}}, 0x8000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="74756e6c3000000000000000000000003ecec1183df10700a2d229674aa61f4363f3df88346d6b5b9c80d34bbd54a5f3ff6a8b4e41baf2d97efcdc9ed640abb0ef956817a49e7e3fb1e38a1431235b4a23ef25beb1ab19ad6d4c94f6c88b860d8b4be87de060d40deae6efbf4022ebd6ceea45cb6c6d285e0286482bd1a219ed972483e77f58b51c2dcecb745edea0b0d0ba2a2cbff948e28b7719ef724105c1e10ca3b913627a3ff20f32488df690955769df9e0a80ef1b32a94ad13ccb2d91731dd4ec4e5f781d53c8b7c4e5b5f8c37a9895a0b9228c2432fc07455e938770c39cff57392af73ce8ae68f0da37db43", @ANYRES32=0x0, @ANYBLOB="8000780000000000000001ff4d1c003400650000022f9078ac1414bbac14142f441c8863ac1414aa00000007e000000200000101e00000020000000094040100"]}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x9, 0x0, 0x80, 0x1, 0x0, '\x00', r0, r1, 0x0, 0x0, 0x5}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, 0x0) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) mq_getsetattr(r5, &(0x7f0000000140)={0x527f, 0x9, 0x9, 0x35f2}, &(0x7f0000000180)) (async) read$FUSE(r4, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) (async) sendmsg$key(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"/492], 0x180}}, 0x8000) (async) 00:45:51 executing program 3: socket$pppoe(0x18, 0x1, 0x0) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 00:45:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14}, 0x48) 00:45:51 executing program 5: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$smackfs_ptrace(r0, &(0x7f0000000040)=0x1, 0x14) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 3: socket$pppoe(0x18, 0x1, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x2) (async) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) (async) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)={0x1, r1}) 00:45:51 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3ff, 0x40000) keyctl$KEYCTL_WATCH_KEY(0x5, r0, r1, 0xfffffffffe) 00:45:51 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3ff, 0x40000) keyctl$KEYCTL_WATCH_KEY(0x5, r0, r1, 0xfffffffffe) 00:45:51 executing program 5: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$smackfs_ptrace(r0, &(0x7f0000000040)=0x1, 0x14) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 3: socket$pppoe(0x18, 0x1, 0x0) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) socket$pppoe(0x18, 0x1, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) (async) [ 2751.681039][T29642] Bluetooth: hci4: command 0x201b tx timeout 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 5: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$smackfs_ptrace(r0, &(0x7f0000000040)=0x1, 0x14) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 2: getrusage(0x1, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffc, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) getrusage(0x0, &(0x7f00000001c0)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x200, 0x8000, 0xfffffff7}) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x2e) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "9c250ea43f4db02f274d3f0465b9be1dc8088cbcaeaf8b99155373cada8a406ab69bdca4fc7b91ed31b8bd0c1e3bb2c72da209b3b426d35b25be2707c40e18ac", 0x17}, 0x48, 0xfffffffffffffff9) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "32f268a761eaabb1667376b68e5036c51ec8d579289520e42171681bdf9435daeadc084d7b9758a11f7f3b8ef57aa5b8b52a9801fbe9acb81f1b7ae063a7e7c5", 0x1000002e}, 0x48, r0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x48000, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xaf) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) 00:45:51 executing program 1: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async, rerun: 32) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3ff, 0x40000) (rerun: 32) keyctl$KEYCTL_WATCH_KEY(0x5, r0, r1, 0xfffffffffe) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x2e) 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x14) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "9c250ea43f4db02f274d3f0465b9be1dc8088cbcaeaf8b99155373cada8a406ab69bdca4fc7b91ed31b8bd0c1e3bb2c72da209b3b426d35b25be2707c40e18ac", 0x17}, 0x48, 0xfffffffffffffff9) (rerun: 64) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "32f268a761eaabb1667376b68e5036c51ec8d579289520e42171681bdf9435daeadc084d7b9758a11f7f3b8ef57aa5b8b52a9801fbe9acb81f1b7ae063a7e7c5", 0x1000002e}, 0x48, r0) (async, rerun: 32) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x48000, 0x0) (rerun: 32) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xaf) (async, rerun: 64) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) (rerun: 64) 00:45:51 executing program 2: getrusage(0x1, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffc, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) getrusage(0x0, &(0x7f00000001c0)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x200, 0x8000, 0xfffffff7}) getrusage(0x1, &(0x7f0000000100)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffc, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) getrusage(0x0, &(0x7f00000001c0)) (async) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x200, 0x8000, 0xfffffff7}) (async) 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x14) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x14) (async) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x2e) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x2e) (async) 00:45:51 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x6) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYBLOB="08002bbd7000fddbdf25030000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000041) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, 0x0) 00:45:51 executing program 2: getrusage(0x1, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0xfffffffc, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) getrusage(0x0, &(0x7f00000001c0)) (async) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x200, 0x8000, 0xfffffff7}) 00:45:51 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x14) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000000)=0x2, 0x14) (async) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000002040)={0x4, 0x0, [{0x6, 0x2, 0x6, [0x1ff, 0x1f, 0x75cb, 0x2, 0x380, 0x0, 0x4, 0xb2e]}, {0x9, 0x6c7, 0xfffffff8, [0x5, 0x2, 0x23, 0xc0000000, 0x9f4, 0x1, 0xfffffc00, 0x81]}, {0x7a8, 0x3, 0xf51c, [0x101, 0x7, 0xcea, 0x1, 0x1, 0x5, 0x1, 0x3f]}, {0x1e061cb1, 0x4, 0x3ff, [0x2, 0x5, 0x0, 0x2, 0xff, 0x5, 0x4, 0x7]}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 00:45:51 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "9c250ea43f4db02f274d3f0465b9be1dc8088cbcaeaf8b99155373cada8a406ab69bdca4fc7b91ed31b8bd0c1e3bb2c72da209b3b426d35b25be2707c40e18ac", 0x17}, 0x48, 0xfffffffffffffff9) (rerun: 64) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @desc4}, &(0x7f00000001c0)={0x0, "32f268a761eaabb1667376b68e5036c51ec8d579289520e42171681bdf9435daeadc084d7b9758a11f7f3b8ef57aa5b8b52a9801fbe9acb81f1b7ae063a7e7c5", 0x1000002e}, 0x48, r0) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x48000, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xaf) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) 00:45:51 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x6) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYBLOB="08002bbd7000fddbdf25030000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000041) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x6) (async) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYBLOB="08002bbd7000fddbdf25030000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000041) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, 0x0) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000002040)={0x4, 0x0, [{0x6, 0x2, 0x6, [0x1ff, 0x1f, 0x75cb, 0x2, 0x380, 0x0, 0x4, 0xb2e]}, {0x9, 0x6c7, 0xfffffff8, [0x5, 0x2, 0x23, 0xc0000000, 0x9f4, 0x1, 0xfffffc00, 0x81]}, {0x7a8, 0x3, 0xf51c, [0x101, 0x7, 0xcea, 0x1, 0x1, 0x5, 0x1, 0x3f]}, {0x1e061cb1, 0x4, 0x3ff, [0x2, 0x5, 0x0, 0x2, 0xff, 0x5, 0x4, 0x7]}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000002040)={0x4, 0x0, [{0x6, 0x2, 0x6, [0x1ff, 0x1f, 0x75cb, 0x2, 0x380, 0x0, 0x4, 0xb2e]}, {0x9, 0x6c7, 0xfffffff8, [0x5, 0x2, 0x23, 0xc0000000, 0x9f4, 0x1, 0xfffffc00, 0x81]}, {0x7a8, 0x3, 0xf51c, [0x101, 0x7, 0xcea, 0x1, 0x1, 0x5, 0x1, 0x3f]}, {0x1e061cb1, 0x4, 0x3ff, [0x2, 0x5, 0x0, 0x2, 0xff, 0x5, 0x4, 0x7]}]}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) 00:45:51 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_DO_IT(r2, 0xab03) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r4 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r4, @ANYBLOB="ab2803f8988952331cbc8fc3e21970a99cc5c2de2e2bc3ef578a824d3c88262d93d1e9022620468f6ba1fab634f225c100"/63, @ANYRES8=r2, @ANYRES16=0x0]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x3f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000001b4e1feec1c0ec30970a8b4487b5092500000080000000", @ANYRES32=r0, @ANYBLOB="01000080000000002e2f66696c653000"]) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x3) r6 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2f9, 0x4001) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r6, 0x5760, 0x9) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x6) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYBLOB="08002bbd7000fddbdf25030000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000041) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x6) (async) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYBLOB="08002bbd7000fddbdf25030000000800010002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000041) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:51 executing program 3: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x1, 0x5}) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000040)={0x1, 0x7457}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, 0x0) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (rerun: 32) 00:45:51 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000002040)={0x4, 0x0, [{0x6, 0x2, 0x6, [0x1ff, 0x1f, 0x75cb, 0x2, 0x380, 0x0, 0x4, 0xb2e]}, {0x9, 0x6c7, 0xfffffff8, [0x5, 0x2, 0x23, 0xc0000000, 0x9f4, 0x1, 0xfffffc00, 0x81]}, {0x7a8, 0x3, 0xf51c, [0x101, 0x7, 0xcea, 0x1, 0x1, 0x5, 0x1, 0x3f]}, {0x1e061cb1, 0x4, 0x3ff, [0x2, 0x5, 0x0, 0x2, 0xff, 0x5, 0x4, 0x7]}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 00:45:51 executing program 3: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x1, 0x5}) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000040)={0x1, 0x7457}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x1, 0x5}) (async) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000040)={0x1, 0x7457}) (async) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 00:45:51 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:51 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000000000000614c6161616161616161616161616161616161616161616161616161616161613100000000ffffffff3131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0xffffffff80000003, 0x842c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) r4 = fsopen(&(0x7f0000000200)='binder\x00', 0x1) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f0000000240)={{0xb6, 0x3}, 0x100, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r3, 0x59) 00:45:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) bind$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r4, 0x0) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) [ 2752.028058][T11121] nbd5: detected capacity change from 0 to 126 [ 2752.751138][ T7866] block nbd5: Receive control failed (result -32) [ 2752.754167][T11077] block nbd5: shutting down sockets 00:45:52 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) write$khugepaged_scan(r0, &(0x7f0000000000), 0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0xaa6}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:52 executing program 3: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x1, 0x5}) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000040)={0x1, 0x7457}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000000)={0x1, 0x5}) (async) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000040)={0x1, 0x7457}) (async) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) bind$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r4, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) socket$unix(0x1, 0x5, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) (async) bind$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r4, 0x0) (async) 00:45:52 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000000000000614c6161616161616161616161616161616161616161616161616161616161613100000000ffffffff3131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0xffffffff80000003, 0x842c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) (async) r4 = fsopen(&(0x7f0000000200)='binder\x00', 0x1) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f0000000240)={{0xb6, 0x3}, 0x100, './file0\x00'}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r3, 0x59) 00:45:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) (async) ioctl$NBD_DO_IT(r2, 0xab03) (async) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) r4 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x4) (async) socket$unix(0x1, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r4, @ANYBLOB="ab2803f8988952331cbc8fc3e21970a99cc5c2de2e2bc3ef578a824d3c88262d93d1e9022620468f6ba1fab634f225c100"/63, @ANYRES8=r2, @ANYRES16=0x0]) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) (async) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x3f) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000001b4e1feec1c0ec30970a8b4487b5092500000080000000", @ANYRES32=r0, @ANYBLOB="01000080000000002e2f66696c653000"]) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x3) (async) r6 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2f9, 0x4001) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r6, 0x5760, 0x9) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (rerun: 64) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) (async) bind$unix(r2, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) (async, rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r4, 0x0) 00:45:52 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$khugepaged_scan(r0, &(0x7f0000000000), 0x8) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0xaa6}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:45:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x2, r1, r0, 0x0) 00:45:52 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000000000000614c6161616161616161616161616161616161616161616161616161616161613100000000ffffffff3131313131313131313131313131313131313131313131"], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0xffffffff80000003, 0x842c0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) r4 = fsopen(&(0x7f0000000200)='binder\x00', 0x1) ioctl$AUTOFS_IOC_EXPIRE(r4, 0x810c9365, &(0x7f0000000240)={{0xb6, 0x3}, 0x100, './file0\x00'}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r3, 0x59) 00:45:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) r1 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x2, r1, r0, 0x0) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:52 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x101200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000000)={0x0, 0xfff}) 00:45:52 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x40, 0x7, 0x9, 0x4, {{0x12, 0x4, 0x2, 0x5, 0x48, 0x66, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x2c, 0x69, 0x1, 0x3, [{@loopback, 0x4}, {@initdev={0xac, 0x1e, 0x5, 0x0}}, {@multicast1, 0x9}, {@broadcast, 0x7fffffff}, {@remote, 0x1}]}]}}}}}) 00:45:52 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) write$khugepaged_scan(r0, &(0x7f0000000000), 0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r5 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0xaa6}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) syz_open_dev$vcsa(&(0x7f0000000100), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$khugepaged_scan(r0, &(0x7f0000000000), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r2, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r4, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r2, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r3, r5, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0xaa6}}, 0x18) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) [ 2752.866118][T11149] block nbd5: shutting down sockets 00:45:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) ioctl$NBD_DO_IT(r2, 0xab03) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r4 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x4) socket$unix(0x1, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r4, @ANYBLOB="ab2803f8988952331cbc8fc3e21970a99cc5c2de2e2bc3ef578a824d3c88262d93d1e9022620468f6ba1fab634f225c100"/63, @ANYRES8=r2, @ANYRES16=0x0]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x3f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000001b4e1feec1c0ec30970a8b4487b5092500000080000000", @ANYRES32=r0, @ANYBLOB="01000080000000002e2f66696c653000"]) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x3) r6 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2f9, 0x4001) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r6, 0x5760, 0x9) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) (async) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) (async) ioctl$NBD_DO_IT(r2, 0xab03) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x4) (async) socket$unix(0x1, 0x1, 0x0) (async) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRESDEC, @ANYRESHEX=r1, @ANYRES32, @ANYRESOCT=r4, @ANYBLOB="ab2803f8988952331cbc8fc3e21970a99cc5c2de2e2bc3ef578a824d3c88262d93d1e9022620468f6ba1fab634f225c100"/63, @ANYRES8=r2, @ANYRES16=0x0]) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) (async) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x3f) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000001b4e1feec1c0ec30970a8b4487b5092500000080000000", @ANYRES32=r0, @ANYBLOB="01000080000000002e2f66696c653000"]) (async) read$FUSE(r5, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x3) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x2f9, 0x4001) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r6, 0x5760, 0x9) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) 00:45:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) r1 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x2, r1, r0, 0x0) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:52 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x101200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000000)={0x0, 0xfff}) 00:45:52 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xd) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "fb7ee40b6793ba123aa2888d075918db3ff65ecc776a5fb150f38cda10102c638d3d6cda662515ad41f4958153bb4650cbe5ff6ceb6d02e689826bf9de810e49", 0x23}, 0x48, 0xfffffffffffffffb) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000400)) pipe2$watch_queue(&(0x7f0000000340), 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xb0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f00000000c0)=ANY=[@ANYBLOB="070000000000000002000000000000009a030000ffffff7f0500000008000000010000000002000000ffff00000200000000000000010001000700000099000000010000000100000072750000ff0700000600000006000000c1ffffff03000000050000000001000007000000040000000300000000000002f8ffffff3f0000003f00000000080000050000000300000004000000ff070000ff07000008000000ff01000003000000050000000600000000000000060000002000000020000000d70e00000000000000000080080000000600ffff07000000050000000800000008000000ff01000007000000fbc87e0c50be7d64e200000001010000060000000500000006000000070000003529f244b4ca000002000000090000000800000006000000ff0700003f00000068000000"]) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x2480) 00:45:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', r1, 0x8000, 0x40, 0x0, 0x8, {{0xc, 0x4, 0x0, 0x3, 0x30, 0x68, 0x0, 0xf9, 0x29, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, {[@lsrr={0x83, 0x1b, 0xac, [@broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local]}]}}}}}) 00:45:52 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x4) (async) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x40, 0x7, 0x9, 0x4, {{0x12, 0x4, 0x2, 0x5, 0x48, 0x66, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x2c, 0x69, 0x1, 0x3, [{@loopback, 0x4}, {@initdev={0xac, 0x1e, 0x5, 0x0}}, {@multicast1, 0x9}, {@broadcast, 0x7fffffff}, {@remote, 0x1}]}]}}}}}) (rerun: 64) 00:45:52 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4", 0x35}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:45:52 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x101200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f0000000000)={0x0, 0xfff}) 00:45:52 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) (async, rerun: 64) r0 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xd) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "fb7ee40b6793ba123aa2888d075918db3ff65ecc776a5fb150f38cda10102c638d3d6cda662515ad41f4958153bb4650cbe5ff6ceb6d02e689826bf9de810e49", 0x23}, 0x48, 0xfffffffffffffffb) (async) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000400)) (async) pipe2$watch_queue(&(0x7f0000000340), 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xb0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x2480) [ 2752.993000][T11226] nbd5: detected capacity change from 0 to 126 [ 2753.003661][T11199] block nbd5: shutting down sockets 00:45:52 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10000000000f5) 00:45:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', r1, 0x8000, 0x40, 0x0, 0x8, {{0xc, 0x4, 0x0, 0x3, 0x30, 0x68, 0x0, 0xf9, 0x29, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, {[@lsrr={0x83, 0x1b, 0xac, [@broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', r1, 0x8000, 0x40, 0x0, 0x8, {{0xc, 0x4, 0x0, 0x3, 0x30, 0x68, 0x0, 0xf9, 0x29, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, {[@lsrr={0x83, 0x1b, 0xac, [@broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local]}]}}}}}) (async) [ 2753.761013][ T3126] Bluetooth: hci4: command 0x201b tx timeout [ 2755.840942][ T3126] Bluetooth: hci4: command 0x201b tx timeout [ 2757.920970][T29642] Bluetooth: hci4: command 0x201b tx timeout [ 2760.000967][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2762.081094][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2764.161027][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2766.241087][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2767.841488][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 2767.843062][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 2768.320960][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2770.401182][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2772.481092][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2774.561013][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2776.641060][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2778.721016][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2780.801022][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2782.881052][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2783.201022][ T76] block nbd5: Possible stuck request 0000000044009fcf: control (read@0,4096B). Runtime 30 seconds [ 2784.961077][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2787.040938][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2789.120989][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2791.200985][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2793.280934][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2795.361101][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2797.440930][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2799.521087][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2801.601047][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2803.681066][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2805.761021][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2807.841069][T29642] Bluetooth: hci4: command 0x0409 tx timeout 00:46:47 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xaf) 00:46:47 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xd) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "fb7ee40b6793ba123aa2888d075918db3ff65ecc776a5fb150f38cda10102c638d3d6cda662515ad41f4958153bb4650cbe5ff6ceb6d02e689826bf9de810e49", 0x23}, 0x48, 0xfffffffffffffffb) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000400)) pipe2$watch_queue(&(0x7f0000000340), 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xb0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x2480) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) (async) add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xd) (async) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "fb7ee40b6793ba123aa2888d075918db3ff65ecc776a5fb150f38cda10102c638d3d6cda662515ad41f4958153bb4650cbe5ff6ceb6d02e689826bf9de810e49", 0x23}, 0x48, 0xfffffffffffffffb) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300), 0x440000, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000400)) (async) pipe2$watch_queue(&(0x7f0000000340), 0x80) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xb0) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x2480) (async) 00:46:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (rerun: 64) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'syztnl0\x00', r1, 0x8000, 0x40, 0x0, 0x8, {{0xc, 0x4, 0x0, 0x3, 0x30, 0x68, 0x0, 0xf9, 0x29, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, {[@lsrr={0x83, 0x1b, 0xac, [@broadcast, @dev={0xac, 0x14, 0x14, 0x11}, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local]}]}}}}}) 00:46:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10000000000f5) 00:46:47 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x40, 0x7, 0x9, 0x4, {{0x12, 0x4, 0x2, 0x5, 0x48, 0x66, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x2c, 0x69, 0x1, 0x3, [{@loopback, 0x4}, {@initdev={0xac, 0x1e, 0x5, 0x0}}, {@multicast1, 0x9}, {@broadcast, 0x7fffffff}, {@remote, 0x1}]}]}}}}}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x4) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x40, 0x7, 0x9, 0x4, {{0x12, 0x4, 0x2, 0x5, 0x48, 0x66, 0x0, 0x1, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0x2c, 0x69, 0x1, 0x3, [{@loopback, 0x4}, {@initdev={0xac, 0x1e, 0x5, 0x0}}, {@multicast1, 0x9}, {@broadcast, 0x7fffffff}, {@remote, 0x1}]}]}}}}}) (async) 00:46:47 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:47 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10000000000f5) 00:46:47 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:47 executing program 3: syz_open_dev$vcsa(&(0x7f0000000180), 0x3ff, 0x280000) syz_open_dev$ptys(0xc, 0x3, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) write$proc_mixer(r0, &(0x7f00000001c0)=[{'PHONEIN', @val={' \'', 'Line Capture'}}, {'DIGITAL2', @void}, {'PHONEIN', @void}, {'TREBLE', @val={' \'', 'Master'}}, {'LINE3', @void}, {'PHONEIN', @val={' \'', 'Master Capture Switch'}}, {'VOLUME', @void}, {'LINE2', @void}, {'OGAIN', @val={' \'', 'Master Playback'}}, {'SPEAKER', @val={' \'', 'Master Capture'}}], 0x105) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, {&(0x7f0000000000)=""/112, 0x70, &(0x7f0000000080)=""/84, 0x1, 0x4}}, 0x48) 00:46:47 executing program 2: read$watch_queue(0xffffffffffffffff, &(0x7f0000000040)=""/27, 0x1b) pipe2$watch_queue(&(0x7f0000000080), 0x80) 00:46:47 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "96d9b696d000c8d4da49bd62c635f0f6605765713b614cf6b3cd2ac654825c254fb08046e879b2ff648974bdf99e046155d2d5b5047028fd5bab39f4c647321c", 0x33}, 0x48, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xb0) 00:46:47 executing program 3: syz_open_dev$vcsa(&(0x7f0000000180), 0x3ff, 0x280000) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$proc_mixer(r0, &(0x7f00000001c0)=[{'PHONEIN', @val={' \'', 'Line Capture'}}, {'DIGITAL2', @void}, {'PHONEIN', @void}, {'TREBLE', @val={' \'', 'Master'}}, {'LINE3', @void}, {'PHONEIN', @val={' \'', 'Master Capture Switch'}}, {'VOLUME', @void}, {'LINE2', @void}, {'OGAIN', @val={' \'', 'Master Playback'}}, {'SPEAKER', @val={' \'', 'Master Capture'}}], 0x105) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, {&(0x7f0000000000)=""/112, 0x70, &(0x7f0000000080)=""/84, 0x1, 0x4}}, 0x48) 00:46:47 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r0, 0x0) [ 2809.921079][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2812.001177][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2812.561149][ T7866] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 2813.281055][ T76] block nbd5: Possible stuck request 0000000044009fcf: control (read@0,4096B). Runtime 60 seconds [ 2814.081056][T11195] Bluetooth: hci4: command 0x0409 tx timeout [ 2814.723383][ T675] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 2814.725942][ T675] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 2814.727930][ T675] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 2814.730124][ T675] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 2814.732638][ T675] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 2814.734420][ T675] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 2814.818310][T11368] chnl_net:caif_netlink_parms(): no params data found [ 2814.834926][T11368] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.836637][T11368] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.838734][T11368] device bridge_slave_0 entered promiscuous mode [ 2814.842275][T11368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.844057][T11368] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.846139][T11368] device bridge_slave_1 entered promiscuous mode [ 2814.854146][T11368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2814.857378][T11368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2814.866038][T11368] team0: Port device team_slave_0 added [ 2814.868315][T11368] team0: Port device team_slave_1 added [ 2814.875417][T11368] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2814.877058][T11368] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2814.883829][T11368] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2814.887350][T11368] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2814.888992][T11368] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2814.895725][T11368] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2814.952609][T11368] device hsr_slave_0 entered promiscuous mode [ 2814.991321][T11368] device hsr_slave_1 entered promiscuous mode [ 2815.021048][T11368] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2815.022900][T11368] Cannot create hsr debugfs directory [ 2815.104076][T11368] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2815.170017][T11368] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2815.272671][T11368] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2815.332064][T11368] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2815.473719][T11368] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2815.522074][T11368] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2815.552788][T11368] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2815.582477][T11368] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2815.628447][T11368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.630206][T11368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.632398][T11368] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.634266][T11368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.668931][T11368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2815.679468][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2815.685666][T11195] bridge0: port 1(bridge_slave_0) entered disabled state [ 2815.688090][T11195] bridge0: port 2(bridge_slave_1) entered disabled state [ 2815.690723][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2815.701664][T11368] 8021q: adding VLAN 0 to HW filter on device team0 [ 2815.719743][ T3112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2815.722186][ T3112] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.723928][ T3112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.725890][ T3112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2815.728111][ T3112] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.729789][ T3112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.739195][ T3112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2815.741608][ T3112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2815.744438][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2815.750869][T11368] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2815.753788][T11368] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2815.756996][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2815.759131][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2815.769354][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2815.825338][T11368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2815.827507][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2815.829491][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2815.924849][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2815.927113][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2815.942303][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2815.944569][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2815.946921][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2815.949007][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2815.952943][T11368] device veth0_vlan entered promiscuous mode [ 2815.956630][T11368] device veth1_vlan entered promiscuous mode [ 2815.965096][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2815.967249][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2815.969385][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2815.972920][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2815.975865][T11368] device veth0_macvtap entered promiscuous mode [ 2815.979251][T11368] device veth1_macvtap entered promiscuous mode [ 2815.985537][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2815.988114][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.990490][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2815.994142][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2815.996531][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2815.999054][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.002306][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2816.004848][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.007211][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2816.009689][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.012975][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2816.015486][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.018518][T11368] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2816.020689][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2816.022972][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2816.025148][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2816.027438][T29642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2816.031704][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.034190][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.036496][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.039058][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.042399][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.044813][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.047179][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.049671][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.053274][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.055706][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.058028][T11368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2816.060516][T11368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2816.063873][T11368] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2816.066162][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2816.068357][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2816.072696][T11368] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2816.074806][T11368] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2816.076919][T11368] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2816.078950][T11368] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2816.168697][T11379] Bluetooth: hci4: command 0x0409 tx timeout 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xaf) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 2: read$watch_queue(0xffffffffffffffff, &(0x7f0000000040)=""/27, 0x1b) pipe2$watch_queue(&(0x7f0000000080), 0x80) 00:46:56 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r0, 0x0) 00:46:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "96d9b696d000c8d4da49bd62c635f0f6605765713b614cf6b3cd2ac654825c254fb08046e879b2ff648974bdf99e046155d2d5b5047028fd5bab39f4c647321c", 0x33}, 0x48, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xb0) 00:46:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000180), 0x3ff, 0x280000) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$proc_mixer(r0, &(0x7f00000001c0)=[{'PHONEIN', @val={' \'', 'Line Capture'}}, {'DIGITAL2', @void}, {'PHONEIN', @void}, {'TREBLE', @val={' \'', 'Master'}}, {'LINE3', @void}, {'PHONEIN', @val={' \'', 'Master Capture Switch'}}, {'VOLUME', @void}, {'LINE2', @void}, {'OGAIN', @val={' \'', 'Master Playback'}}, {'SPEAKER', @val={' \'', 'Master Capture'}}], 0x105) (async) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, {&(0x7f0000000000)=""/112, 0x70, &(0x7f0000000080)=""/84, 0x1, 0x4}}, 0x48) 00:46:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "96d9b696d000c8d4da49bd62c635f0f6605765713b614cf6b3cd2ac654825c254fb08046e879b2ff648974bdf99e046155d2d5b5047028fd5bab39f4c647321c", 0x33}, 0x48, 0xfffffffffffffff8) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xb0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "96d9b696d000c8d4da49bd62c635f0f6605765713b614cf6b3cd2ac654825c254fb08046e879b2ff648974bdf99e046155d2d5b5047028fd5bab39f4c647321c", 0x33}, 0x48, 0xfffffffffffffff8) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xb0) (async) 00:46:56 executing program 2: read$watch_queue(0xffffffffffffffff, &(0x7f0000000040)=""/27, 0x1b) pipe2$watch_queue(&(0x7f0000000080), 0x80) read$watch_queue(0xffffffffffffffff, &(0x7f0000000040)=""/27, 0x1b) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x81, 0x7}, 0x100, './file0\x00'}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) 00:46:56 executing program 1: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, r0, 0x0) 00:46:56 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) socketpair(0x1, 0xa, 0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0xbd) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x80000001, 'syz1\x00', @bcast, 0x5a37, 0x7, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0xaf) 00:46:56 executing program 2: ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) eventfd2(0x1000, 0x800) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r1 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x45, 0x4, 0x0, {0x5, 0x3, 0x8, 0x7ff, 0xffffffffffffffff, 0x7fffffff, 0x81, 0x8001, 0x2, 0xa000, 0xea, 0x0, r1, 0x0, 0x3f}}}, 0x78) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_LSEEK(r2, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, r4, {0x8}}, 0x18) mq_open(&(0x7f0000000140)='(\\\xb7\\\x00', 0x800, 0x51, &(0x7f0000000180)={0xffffffffffdfffff, 0xfc, 0x100000001f, 0x81}) getegid() clock_gettime(0x0, &(0x7f0000004400)={0x0, 0x0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000004300)=""/225, 0xe1, 0x0, &(0x7f00000044c0)={r8, r9+10000000}) pipe2$watch_queue(&(0x7f00000000c0), 0x80) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x81, 0x7}, 0x100, './file0\x00'}) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) 00:46:56 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) socketpair(0x1, 0xa, 0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) (rerun: 32) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0xbd) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x80000001, 'syz1\x00', @bcast, 0x5a37, 0x7, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}) 00:46:56 executing program 2: ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) eventfd2(0x1000, 0x800) 00:46:56 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r1 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x45, 0x4, 0x0, {0x5, 0x3, 0x8, 0x7ff, 0xffffffffffffffff, 0x7fffffff, 0x81, 0x8001, 0x2, 0xa000, 0xea, 0x0, r1, 0x0, 0x3f}}}, 0x78) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r3, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) write$FUSE_LSEEK(r2, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, r4, {0x8}}, 0x18) mq_open(&(0x7f0000000140)='(\\\xb7\\\x00', 0x800, 0x51, &(0x7f0000000180)={0xffffffffffdfffff, 0xfc, 0x100000001f, 0x81}) getegid() clock_gettime(0x0, &(0x7f0000004400)={0x0, 0x0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000004300)=""/225, 0xe1, 0x0, &(0x7f00000044c0)={r8, r9+10000000}) pipe2$watch_queue(&(0x7f00000000c0), 0x80) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) getegid() (async) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x45, 0x4, 0x0, {0x5, 0x3, 0x8, 0x7ff, 0xffffffffffffffff, 0x7fffffff, 0x81, 0x8001, 0x2, 0xa000, 0xea, 0x0, r1, 0x0, 0x3f}}}, 0x78) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) (async) read$FUSE(r3, &(0x7f0000004500)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) getegid() (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_LSEEK(r2, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, r4, {0x8}}, 0x18) (async) mq_open(&(0x7f0000000140)='(\\\xb7\\\x00', 0x800, 0x51, &(0x7f0000000180)={0xffffffffffdfffff, 0xfc, 0x100000001f, 0x81}) (async) getegid() (async) clock_gettime(0x0, &(0x7f0000004400)) (async) mq_timedreceive(0xffffffffffffffff, &(0x7f0000004300)=""/225, 0xe1, 0x0, &(0x7f00000044c0)={r8, r9+10000000}) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x4000000004) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x81, 0x7}, 0x100, './file0\x00'}) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 2: ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) eventfd2(0x1000, 0x800) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) (async) eventfd2(0x1000, 0x800) (async) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x4000000004) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x4000000004) (async) fsopen(&(0x7f0000000140)='pstore\x00', 0x0) (async) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) 00:46:56 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) socketpair(0x1, 0xa, 0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0xbd) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x80000001, 'syz1\x00', @bcast, 0x5a37, 0x7, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) socketpair(0x1, 0xa, 0x5, &(0x7f00000000c0)) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0xbd) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x80000001, 'syz1\x00', @bcast, 0x5a37, 0x7, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}) (async) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 2: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x37) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:46:56 executing program 1: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r1 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x45, 0x4, 0x0, {0x5, 0x3, 0x8, 0x7ff, 0xffffffffffffffff, 0x7fffffff, 0x81, 0x8001, 0x2, 0xa000, 0xea, 0x0, r1, 0x0, 0x3f}}}, 0x78) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(r3, &(0x7f0000004500)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000004240)={0xa0, 0xfffffffffffffff5, r4, {{0x5, 0x1, 0x1, 0x4, 0x9, 0x0, {0x3, 0x1, 0x9, 0x7, 0x1, 0xd69, 0x0, 0x4, 0x4, 0x1000, 0x400, 0xee01, r6, 0x1, 0x1}}, {0x0, 0x10}}}, 0xa0) (async) r7 = getegid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000004440)={0x78, 0x0, r4, {0x1, 0x3, 0x0, {0x2, 0x7, 0x6, 0x6, 0x1, 0x7fff, 0x2, 0x8, 0x8, 0x8000, 0x6, r5, r7, 0xfe, 0xfffffff7}}}, 0x78) (async) write$FUSE_LSEEK(r2, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, r4, {0x8}}, 0x18) (async) mq_open(&(0x7f0000000140)='(\\\xb7\\\x00', 0x800, 0x51, &(0x7f0000000180)={0xffffffffffdfffff, 0xfc, 0x100000001f, 0x81}) getegid() (async) clock_gettime(0x0, &(0x7f0000004400)={0x0, 0x0}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000004300)=""/225, 0xe1, 0x0, &(0x7f00000044c0)={r8, r9+10000000}) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x4000000004) (async) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:46:56 executing program 2: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x37) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x37) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4c202, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000040)={0x1, 0x0, [{0xfffffaa3, 0x2, 0xfffff36c, [0x7, 0x7ff, 0x6, 0xffff, 0x3, 0x8, 0x0, 0x9]}]}) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x1000, 0x81, &(0x7f0000000080)=""/129, 0x41000, 0x3, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x80) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, "22d0586dfb7f912c95e02a2b238a53956e602f57ea978021c656594f5fc017fde68c576c413ce06b419071a64b8b34037700156c9381499796c6dd8e62011a1a", 0x2c}, 0x48, r0) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) (async) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x1000, 0x81, &(0x7f0000000080)=""/129, 0x41000, 0x3, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x1000, 0x81, &(0x7f0000000080)=""/129, 0x41000, 0x3, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x80) (async) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4c202, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000040)={0x1, 0x0, [{0xfffffaa3, 0x2, 0xfffff36c, [0x7, 0x7ff, 0x6, 0xffff, 0x3, 0x8, 0x0, 0x9]}]}) 00:46:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r0) 00:46:56 executing program 2: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x37) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) (async) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) (async) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) (async) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x1000, 0x81, &(0x7f0000000080)=""/129, 0x41000, 0x3, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x1000, 0x81, &(0x7f0000000080)=""/129, 0x41000, 0x3, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0x0, 0x6, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x80) (async) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) (async) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x2}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4c202, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000040)={0x1, 0x0, [{0xfffffaa3, 0x2, 0xfffff36c, [0x7, 0x7ff, 0x6, 0xffff, 0x3, 0x8, 0x0, 0x9]}]}) 00:46:56 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) (async) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) (async) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) (async) 00:46:56 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x450000, 0x0) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) 00:46:56 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x8000000000000000, 0x4, 0x7, 0x0, 0x40, 0x10001, 0x8000, 0x3}, &(0x7f0000000040)={0x8000000000000001, 0x7, 0xfc15f3f, 0xdd, 0x2, 0x7, 0x6, 0x40}, &(0x7f0000000080)={0x9, 0xffffffff00000001, 0x7fffffff, 0x1, 0x3, 0x4, 0x200, 0x80010000000000}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) clock_gettime(0x7, &(0x7f0000000280)) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000180)) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x450000, 0x0) 00:46:56 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 00:46:56 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "23c47ef9ec39f6bab4f8cd614d1d2bc0ff5bc7cb30557b3f492a372c1e69da751b453075a859316574b2281381f9b88bd0f0521d32e22e4f5a83b864a7617ac4"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x450000, 0x0) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @empty, 'tunl0\x00'}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:46:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xc1, 0x400800) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0xbb1, 0x0, 0x0, 0x335, 0xffffffffffffffff, 0x7, '\x00', 0x0, r0, 0x5, 0x2, 0x1}, 0x48) r2 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000180)={{0x8, 0x1f}, 0x100, './file0\x00'}) 00:46:56 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x8000000000000000, 0x4, 0x7, 0x0, 0x40, 0x10001, 0x8000, 0x3}, &(0x7f0000000040)={0x8000000000000001, 0x7, 0xfc15f3f, 0xdd, 0x2, 0x7, 0x6, 0x40}, &(0x7f0000000080)={0x9, 0xffffffff00000001, 0x7fffffff, 0x1, 0x3, 0x4, 0x200, 0x80010000000000}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) clock_gettime(0x7, &(0x7f0000000280)) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000180)) pselect6(0x40, &(0x7f0000000000)={0x8000000000000000, 0x4, 0x7, 0x0, 0x40, 0x10001, 0x8000, 0x3}, &(0x7f0000000040)={0x8000000000000001, 0x7, 0xfc15f3f, 0xdd, 0x2, 0x7, 0x6, 0x40}, &(0x7f0000000080)={0x9, 0xffffffff00000001, 0x7fffffff, 0x1, 0x3, 0x4, 0x200, 0x80010000000000}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) (async) clock_gettime(0x7, &(0x7f0000000280)) (async) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) clock_getres(0x6, &(0x7f0000000180)) (async) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @empty, 'tunl0\x00'}}) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:46:56 executing program 3: keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) 00:46:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xc1, 0x400800) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0xbb1, 0x0, 0x0, 0x335, 0xffffffffffffffff, 0x7, '\x00', 0x0, r0, 0x5, 0x2, 0x1}, 0x48) r2 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000180)={{0x8, 0x1f}, 0x100, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0xc1, 0x400800) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0xbb1, 0x0, 0x0, 0x335, 0xffffffffffffffff, 0x7, '\x00', 0x0, r0, 0x5, 0x2, 0x1}, 0x48) (async) fsopen(&(0x7f0000000140)='pstore\x00', 0x0) (async) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000180)={{0x8, 0x1f}, 0x100, './file0\x00'}) (async) 00:46:56 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c4af3591946869c4d990fb2d13673240069dba9928f12e6a78daa30c2471a58e2ca6ddd1ca4f7c3f09a21debec9bc7a4ad18d79350f9a574034b24cc833a67f303021b6b4c0955c0963869ed991fad210dfff691e1191bc4e0e4faa534bbca43351c5876462967cced7c59baef197297b8e7b3dfbf8bc45a56ad89687b0c9cbceb39967c4a7fbfaa4dd749cffd174c5a75fffe4fcb6e8d7308d19f26c86d5b90e366a878303e592ec0f8857443fe105467e0cca1b983632dd89246fd87363578ec1e3d5071ecc72f92b587f6c820322bf35ba72e786d11edc3abbc79a1527cd4e07ad938105c8c53bddd5fc6bb401b97cc74036845f77b3a2c077c9fecf2d13af045d100898f3658ebd0e80949d17fbe45d59b2312307d895d0af227cec6c91a3f45de23425f6df928427b60016ffcc7a3ca2ad8eff481e45594c5fbce452c390bc955c131363dfd1cf37d9e62ec608cf00ed23c31a21d61f1942ef1d75a0baea366295ab1ecea7b2f153107be9911e26794a07b527fce609dff6efb52090fb20032f120efed23948825bd6d57487e1520d7fd979a61c568a0a534fa5130250cd17dcaa5edf73b3d81112ec25a3c2ef4dc4d3c94273d3eec786ee397e2318818c2afc9e2776e87539f76b2b427762ba0da694e5b33e38fd648d9741ec92cc103a5f7756f77c5f3f3c9970be215305c6f3f9ac49e71f8c9ca8ea95e9d861c8c239b596d3bc393fd74ffc744e45d62351721109df2347912f2a71128fd3289a73ca4b064d58014cf330cd08e9869ddaba974bb64624a575082aaf11fc277ad58a45e65abb54bdd3a31f61179f1299ead8ab5b22366f1521a561e1da15dea9e2b253c25a066a49b66f7f2ecc142590a9b114b5dff514bdf576255d321557963283e8845656bcacfbfd802bbea5b9619aebdcad8c54119946226dfadf240a7be3c81183c434aa1f0225ca10a93cd19ff52330bc70eabbe09bb1c217cb6627d2580641134c382be8e0a2b68d128d2b055c841ff768e886d3bc8dd0129de2ec1c33317d970e699dbf28eddae91a8723516873703a34740dd0539fbc569bdd44f71c040d5e712f4ddcb2789c2141ea19c9771f40467fb27be27c0d50646c5cb1a93da22355f610fdefca8a4a72e08f01e65b49a974bdedd43910292dfc8492feae6b18b234df375bfd6ab0d6009b8db029345251962cef0acc718673873b066e4fad99ecf86b2acf627ab06260626eb2e6a5c71fad749b2962225c401e4138f082224db56298042b1b9d980a5d03323c5762bcb09b31d545f4bb3156cc8b7b9a1c352ba862099f67856927e1a5d4c542d084b2d8fea7875ecbe5213f0d0fb6b2824adf59a3421bf97a884eb31528475fb8f07e8f8b1b016028deea72ad7cc7adcc007c974f1967e7690cf5103be9635773fd953efd70881fba05b2e82e28cf9a25b2258b4cd4835371943bb0cf32b18117e669c8d117c39311cb89ff7a6ac00d224af33a3cd497295467a604bb9faed414633b58b84ba94f26ed3f07e1b4cd11ddf685a920dba56a33685cb29ebab5f604755f025e7ec656d88a03ab7bea73ef78eb7e07e869e9183a93b172f7d570ec81a12faaf6d79e725081952174e045975d5a600215fadc9c765563194907c7d6db3cc9897bb8cca9a013b8371c492aad11d1b8a31b46869329a7daa26e6b9e0584f4d086ca9868a4993adb19cbcba36f2592d87532f511d1053b54400b2125575c436f9539a866d9fef0ad9be52a8fed824ce8f2d5e1d7ae5c266f162153363938a7ed2a13932af13d8b7affff5ff3ef4b4c0f18f3321a9711dfcfc3816b0a6f8f48e2e20c379073ef3366537c355a93d91e277d151943ac83b4720701f795c569b66afa93156b7ad5e247b892ae7bcb1745e0d26721e9686814b8182268d82e8a4176cfed94d985cdc314b34e7bffad120882bd837dcc9319412634ed56043d56982bb4879ae5db9447f415ef44872a1a33c485a107c57e4ceadc080203f22be2a6f3e4b003cf05bcaf835fadec067631e3eefe68b304ca0460e9c8c299f953e174334edffa415304a01b51ed74c9edb31ed1d8f1f567cb1f599d4b7c3a7e8a14fca285e9ce2e8403517b72813411b779a9f8d23d3dc3726786fb0aaf1766d7404efd7434ab37dc699d7d2b919ced426e64404f33a30ab06a657d10c4b4a2d473fe250dc08a80e68c330edcc3482d8cba6ea2962418311afc2de67b8bc3851394479db29816897c7b6e372f73d9a551d5d64daa040b0cd487db0273a1f5f5ffb8ac84de42ff31936e2afce630e2030dd0afdcb3a470e85b19f973e3e60ffd17837bd153d54710ee5e934090afad63268859c258992eb44a333a4cbfa59e18ab8d558c7cd15a46fc5b7be2bdccdf25d022784014b0656df26e0952121a53e20aeb90e64d7d2f19ed44180c55a33679724f5f7c2bb8b9128bf6c62303275e515b8ee2c9c8a08077b85cb47b123bc1c1cbe474fec870c66aa4d9667ac48a491aecf43333749af9e773862fce0743d9c478b8f8e208babb4e5174343fdb973fa272374efb1ae7ac47a3eb457f38ec6823c8674c735802d26b9611e07309fdf89f79d019f3dc3e9af2200ba9c9cba60ba117507d4a63946fc4d592da845872ba02ee09b300514d3efc3a5002caf1c3a5e5413bc7c588106d8643633dee8e514b419256c381d8fb34e4d78e705cf02940a3d625baf8e67d28e39492d0aa42983572ccece344657df4999a2c7af2df5e21592ff16e37f3aebab2bf0113941526a4fda01199382db999eb3bc582bca08e09f0f4136e4e69cb39b2233e6a5cf9bba773d00a6b0403b69e84a6c3eadc0257be887b8f43686ad0760eb4a338bc8d163dedb462d869becc4fcc17445cc618b080cf5cd0e3319c279fb3fbd47fe880914d2da5ecec37b2030c1e53018f961d50612d65811917ed005f7766fd7880fb735af238c509d26d2631566ef79d52f44e1fb01913c8ec211a020d69b6f6a468e30ce2f1564de17f1ecc3c2e73000625f56ffc61425a02340447ef669fcd238fb6667a593f50c5960291441276720ab1d67ec80bf0f959b5f12c4fd0f574fbe8c3ae54382dc36d810cf6956f02d9f02e1c4d8758a33a9d48608ad921652eeea4d5541111dc764c8ae2d04e10e9fdf9c50729a2ce4ffe5cecaea1f505354976a2b08b11847ff4c223b0dc1810c67f0afc972eddfc39dcc39d227ad8b7e100aa8190605a15d11bc039b527625a3085e6896c3c0e102cb2fd2a143a423a10a67ee06ca29baaedc720bebb318d0813d0d59bc71abf6d056917e07b158805193492cd7bb1bcac484ae1c86d8817c41b788abcbd3526d6bdc3d2432380d63fd56251ed4d590ca45c474d772b0175939974fde842a775abfa4856ac3a5d2db052a2eb9d65a7d233b04d64f9d05bfbcaac1f060ff7ea3ed1a5a2b8d8787e3765f2e97bf8aa65e89815e4d58840e35c4b8acf4091f474c5a4b57836f1f0c1dc2849973272d82f2b911bb39bda776cb529243020b24aba955cd9920e5ce86913b14ec88c4b0058cc0991d1c74811837983758249afe35451473f68eb4f4c9470baf160c1a32219fbcadf7e324191bc14f532e3eff8b2f9905b84090f6ee467d6637dc4ab0d2e59dc2fb964e0b6b40f6607ccdd570cea6d96bf193c30ebf87d64cb6270ca91433afac9d8196cce8effcc4bfff536ea7c043d4bffb0b5b23e6c4cbafcd7f590fa9af999bf1772ae92ef982a9cab8b126e0cb5dd979dd36516ef0d4a1382059f35605d6298220a69a848b03f4fe8c04c0e830d634cd82a755947c2e9432d0a796afa12f3eb780fef09deed3ef355edba186a8f0c610215ff8a5e5d13422f3823aed7661bf2a6f745ce3ce04f385fbd27e2c4907deb2de7902266c354f657bfe718b513d4adaf3810fe3c8b9a23598a52c9d854bd02eb97c86461647ef8716b0d4e479c7f0a9ce9e845d2038394f18eede0b962aef57cc6a2cc7aed7a242188b55cd41b6cc1c093e24f3288b0617799a236d1282c1e06418f58b9049b51438007880be216a3eb6fe1c8109e3b3a7d6d61c011272496aba68f4957b7bd5caa86d75ad61a0e67cfea6ad9a0c67d40e35161dcf8bb164cac3196d8d529b8c11b8bf7b509b79394b84c9ea6a3e7112af91dcca9e4dd52cba012758f305dc963e2a64bfdbb3f55be3e9097fd611bde51dde9b7be81c0d0b7bdcb336fe00eb2a155333b13150edb53ae8930f10ff1e68830177adb24735064594321a2fbed32f223fd12cfc50840bb4017c7fc1e216f63fc57b7c15796b9876677a08f35927e739f4234c8a2706aa1d873e8bbc0acef4e49135f8213fc41f7319edaba120a4d1ac774670d0c5a7e5291474e0f819401aa54d3d37ff220e50ec02d7c5b62e3c788fdb2a9faf2daba0de55e6312d23c8a2d9ae3736be953217f8f3aac7648cb8f9c0c109f7bbbdc0692d8fd484b5e5cea913c9339d0fb219e17673eded2b0044441ebf08fbba918648b2d52f5a64eece696281876555bc8d0dfc5a4451c1b6f5981f58a5107a4beb56c287ea1654b8c5dbeaadd12502b072f0663e0def44a1c18b6577ed452a81b7ff83a5c5e23080aab6e2c67a147c8e296793713a01ffe4a15689dcf4ceb28870b826eb2fb7a532b2d2bc26ffba5dd384518d5c5710fbf07749c7e75b2a1e45b72219745817f6c6495d461596a9f47bee17cb7d80e4708d3ff0e766cb236e83ffef8ee875d179a61429cd7ff573b9d7a359c4a2179a4c2e69a596a3bfc9883c6de9436d12bb8d6fd072103407c725fbfdda595adc2c4775134fb98a831baf8685dce6977708e89cc60712aea0158ee5ad173697bb9c328d8811c29f1f01dec67f36eab597e115b7075bbdb9e3760d3c5266adcbcbbaeaada3e3a162fa08247627ccc3fa76c55aa46a9c6ff674a722ec9455112a7b8092cf8d8f8358227f86a296eeee0deca7fcab75cfc17b94bdd0dce682c39d135334cc0dbc6fa142cbb0f6c875ec5c5ca44071f750e866a7921b88b42bba4d4322bd81c9f0fc21e5db6d522e683b96db2d22b9d69427626344472b5133feccab5618e2f05eb179c7c7f9e23029005f8d90e48ff6c2f15e137d6ba4894484c002a48f4dd536689eabf1c33de2575b4022d97d6325a86b121fd442f3d5e451bd760515b5570a66338092ef2ca51b6198e598371669f7e0ee82a45b74a5f9f5d44219288c6e727e591f70da36cbd62caa77b4b572a82d5effd61e24ed166c38c27a4d0f52309636e75992a4b9dc30bc93fcf8deb2507c91d998b89d568e20bf6ec2da52129e2a5e78ed3065e356c1e4e6af31656179a159b7f53231a0840d62dcfb17a840f0948fc9774e4e56249958f2f7774103356f3df60698873d03c4cf30ad1d5b350917a98e7621de07de77b2a46498da825db39ece46e88bdf4295a6488620cfe3443b0c15a78dc5fe2bd4d9c4aedbd7c398d2252b8d44552349c39a3a618d7585e57f9fe52cc606dc5daf30b478a8d74220915c675909c5488f70b4b2511dc9f4acec90c73d3e1afa15ee58aad56ccb5e139d20fcdd750ddd437198e17c55257606505eac12f0275a6433e16ba5bcbf3cb63cf174ccd8487d908f794444c4e21e183fd01ec85e5b92d65ad94a7d08bde0c440ca3eaf7e8ea193368a98c0446ef202090614f4483e233374b73776aa77181ab1d9fe8e7c1613fa8c59a082e1bfee723b4078b8d3f8b0d66ec2f9bd11ceaf9bad4d7240858ba1bdd26423ade125e4e6d7d237fe2b0fae0ac7bf45f507c2c5d1790d1e36980e725df0a22e24", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) 00:46:56 executing program 1: r0 = socket(0x26, 0x1, 0x9) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x4ed1, 0x4) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 00:46:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @empty, 'tunl0\x00'}}) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) 00:46:56 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x8000000000000000, 0x4, 0x7, 0x0, 0x40, 0x10001, 0x8000, 0x3}, &(0x7f0000000040)={0x8000000000000001, 0x7, 0xfc15f3f, 0xdd, 0x2, 0x7, 0x6, 0x40}, &(0x7f0000000080)={0x9, 0xffffffff00000001, 0x7fffffff, 0x1, 0x3, 0x4, 0x200, 0x80010000000000}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) clock_gettime(0x7, &(0x7f0000000280)) (async) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x6, &(0x7f0000000180)) 00:46:56 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="c4af3591946869c4d990fb2d13673240069dba9928f12e6a78daa30c2471a58e2ca6ddd1ca4f7c3f09a21debec9bc7a4ad18d79350f9a574034b24cc833a67f303021b6b4c0955c0963869ed991fad210dfff691e1191bc4e0e4faa534bbca43351c5876462967cced7c59baef197297b8e7b3dfbf8bc45a56ad89687b0c9cbceb39967c4a7fbfaa4dd749cffd174c5a75fffe4fcb6e8d7308d19f26c86d5b90e366a878303e592ec0f8857443fe105467e0cca1b983632dd89246fd87363578ec1e3d5071ecc72f92b587f6c820322bf35ba72e786d11edc3abbc79a1527cd4e07ad938105c8c53bddd5fc6bb401b97cc74036845f77b3a2c077c9fecf2d13af045d100898f3658ebd0e80949d17fbe45d59b2312307d895d0af227cec6c91a3f45de23425f6df928427b60016ffcc7a3ca2ad8eff481e45594c5fbce452c390bc955c131363dfd1cf37d9e62ec608cf00ed23c31a21d61f1942ef1d75a0baea366295ab1ecea7b2f153107be9911e26794a07b527fce609dff6efb52090fb20032f120efed23948825bd6d57487e1520d7fd979a61c568a0a534fa5130250cd17dcaa5edf73b3d81112ec25a3c2ef4dc4d3c94273d3eec786ee397e2318818c2afc9e2776e87539f76b2b427762ba0da694e5b33e38fd648d9741ec92cc103a5f7756f77c5f3f3c9970be215305c6f3f9ac49e71f8c9ca8ea95e9d861c8c239b596d3bc393fd74ffc744e45d62351721109df2347912f2a71128fd3289a73ca4b064d58014cf330cd08e9869ddaba974bb64624a575082aaf11fc277ad58a45e65abb54bdd3a31f61179f1299ead8ab5b22366f1521a561e1da15dea9e2b253c25a066a49b66f7f2ecc142590a9b114b5dff514bdf576255d321557963283e8845656bcacfbfd802bbea5b9619aebdcad8c54119946226dfadf240a7be3c81183c434aa1f0225ca10a93cd19ff52330bc70eabbe09bb1c217cb6627d2580641134c382be8e0a2b68d128d2b055c841ff768e886d3bc8dd0129de2ec1c33317d970e699dbf28eddae91a8723516873703a34740dd0539fbc569bdd44f71c040d5e712f4ddcb2789c2141ea19c9771f40467fb27be27c0d50646c5cb1a93da22355f610fdefca8a4a72e08f01e65b49a974bdedd43910292dfc8492feae6b18b234df375bfd6ab0d6009b8db029345251962cef0acc718673873b066e4fad99ecf86b2acf627ab06260626eb2e6a5c71fad749b2962225c401e4138f082224db56298042b1b9d980a5d03323c5762bcb09b31d545f4bb3156cc8b7b9a1c352ba862099f67856927e1a5d4c542d084b2d8fea7875ecbe5213f0d0fb6b2824adf59a3421bf97a884eb31528475fb8f07e8f8b1b016028deea72ad7cc7adcc007c974f1967e7690cf5103be9635773fd953efd70881fba05b2e82e28cf9a25b2258b4cd4835371943bb0cf32b18117e669c8d117c39311cb89ff7a6ac00d224af33a3cd497295467a604bb9faed414633b58b84ba94f26ed3f07e1b4cd11ddf685a920dba56a33685cb29ebab5f604755f025e7ec656d88a03ab7bea73ef78eb7e07e869e9183a93b172f7d570ec81a12faaf6d79e725081952174e045975d5a600215fadc9c765563194907c7d6db3cc9897bb8cca9a013b8371c492aad11d1b8a31b46869329a7daa26e6b9e0584f4d086ca9868a4993adb19cbcba36f2592d87532f511d1053b54400b2125575c436f9539a866d9fef0ad9be52a8fed824ce8f2d5e1d7ae5c266f162153363938a7ed2a13932af13d8b7affff5ff3ef4b4c0f18f3321a9711dfcfc3816b0a6f8f48e2e20c379073ef3366537c355a93d91e277d151943ac83b4720701f795c569b66afa93156b7ad5e247b892ae7bcb1745e0d26721e9686814b8182268d82e8a4176cfed94d985cdc314b34e7bffad120882bd837dcc9319412634ed56043d56982bb4879ae5db9447f415ef44872a1a33c485a107c57e4ceadc080203f22be2a6f3e4b003cf05bcaf835fadec067631e3eefe68b304ca0460e9c8c299f953e174334edffa415304a01b51ed74c9edb31ed1d8f1f567cb1f599d4b7c3a7e8a14fca285e9ce2e8403517b72813411b779a9f8d23d3dc3726786fb0aaf1766d7404efd7434ab37dc699d7d2b919ced426e64404f33a30ab06a657d10c4b4a2d473fe250dc08a80e68c330edcc3482d8cba6ea2962418311afc2de67b8bc3851394479db29816897c7b6e372f73d9a551d5d64daa040b0cd487db0273a1f5f5ffb8ac84de42ff31936e2afce630e2030dd0afdcb3a470e85b19f973e3e60ffd17837bd153d54710ee5e934090afad63268859c258992eb44a333a4cbfa59e18ab8d558c7cd15a46fc5b7be2bdccdf25d022784014b0656df26e0952121a53e20aeb90e64d7d2f19ed44180c55a33679724f5f7c2bb8b9128bf6c62303275e515b8ee2c9c8a08077b85cb47b123bc1c1cbe474fec870c66aa4d9667ac48a491aecf43333749af9e773862fce0743d9c478b8f8e208babb4e5174343fdb973fa272374efb1ae7ac47a3eb457f38ec6823c8674c735802d26b9611e07309fdf89f79d019f3dc3e9af2200ba9c9cba60ba117507d4a63946fc4d592da845872ba02ee09b300514d3efc3a5002caf1c3a5e5413bc7c588106d8643633dee8e514b419256c381d8fb34e4d78e705cf02940a3d625baf8e67d28e39492d0aa42983572ccece344657df4999a2c7af2df5e21592ff16e37f3aebab2bf0113941526a4fda01199382db999eb3bc582bca08e09f0f4136e4e69cb39b2233e6a5cf9bba773d00a6b0403b69e84a6c3eadc0257be887b8f43686ad0760eb4a338bc8d163dedb462d869becc4fcc17445cc618b080cf5cd0e3319c279fb3fbd47fe880914d2da5ecec37b2030c1e53018f961d50612d65811917ed005f7766fd7880fb735af238c509d26d2631566ef79d52f44e1fb01913c8ec211a020d69b6f6a468e30ce2f1564de17f1ecc3c2e73000625f56ffc61425a02340447ef669fcd238fb6667a593f50c5960291441276720ab1d67ec80bf0f959b5f12c4fd0f574fbe8c3ae54382dc36d810cf6956f02d9f02e1c4d8758a33a9d48608ad921652eeea4d5541111dc764c8ae2d04e10e9fdf9c50729a2ce4ffe5cecaea1f505354976a2b08b11847ff4c223b0dc1810c67f0afc972eddfc39dcc39d227ad8b7e100aa8190605a15d11bc039b527625a3085e6896c3c0e102cb2fd2a143a423a10a67ee06ca29baaedc720bebb318d0813d0d59bc71abf6d056917e07b158805193492cd7bb1bcac484ae1c86d8817c41b788abcbd3526d6bdc3d2432380d63fd56251ed4d590ca45c474d772b0175939974fde842a775abfa4856ac3a5d2db052a2eb9d65a7d233b04d64f9d05bfbcaac1f060ff7ea3ed1a5a2b8d8787e3765f2e97bf8aa65e89815e4d58840e35c4b8acf4091f474c5a4b57836f1f0c1dc2849973272d82f2b911bb39bda776cb529243020b24aba955cd9920e5ce86913b14ec88c4b0058cc0991d1c74811837983758249afe35451473f68eb4f4c9470baf160c1a32219fbcadf7e324191bc14f532e3eff8b2f9905b84090f6ee467d6637dc4ab0d2e59dc2fb964e0b6b40f6607ccdd570cea6d96bf193c30ebf87d64cb6270ca91433afac9d8196cce8effcc4bfff536ea7c043d4bffb0b5b23e6c4cbafcd7f590fa9af999bf1772ae92ef982a9cab8b126e0cb5dd979dd36516ef0d4a1382059f35605d6298220a69a848b03f4fe8c04c0e830d634cd82a755947c2e9432d0a796afa12f3eb780fef09deed3ef355edba186a8f0c610215ff8a5e5d13422f3823aed7661bf2a6f745ce3ce04f385fbd27e2c4907deb2de7902266c354f657bfe718b513d4adaf3810fe3c8b9a23598a52c9d854bd02eb97c86461647ef8716b0d4e479c7f0a9ce9e845d2038394f18eede0b962aef57cc6a2cc7aed7a242188b55cd41b6cc1c093e24f3288b0617799a236d1282c1e06418f58b9049b51438007880be216a3eb6fe1c8109e3b3a7d6d61c011272496aba68f4957b7bd5caa86d75ad61a0e67cfea6ad9a0c67d40e35161dcf8bb164cac3196d8d529b8c11b8bf7b509b79394b84c9ea6a3e7112af91dcca9e4dd52cba012758f305dc963e2a64bfdbb3f55be3e9097fd611bde51dde9b7be81c0d0b7bdcb336fe00eb2a155333b13150edb53ae8930f10ff1e68830177adb24735064594321a2fbed32f223fd12cfc50840bb4017c7fc1e216f63fc57b7c15796b9876677a08f35927e739f4234c8a2706aa1d873e8bbc0acef4e49135f8213fc41f7319edaba120a4d1ac774670d0c5a7e5291474e0f819401aa54d3d37ff220e50ec02d7c5b62e3c788fdb2a9faf2daba0de55e6312d23c8a2d9ae3736be953217f8f3aac7648cb8f9c0c109f7bbbdc0692d8fd484b5e5cea913c9339d0fb219e17673eded2b0044441ebf08fbba918648b2d52f5a64eece696281876555bc8d0dfc5a4451c1b6f5981f58a5107a4beb56c287ea1654b8c5dbeaadd12502b072f0663e0def44a1c18b6577ed452a81b7ff83a5c5e23080aab6e2c67a147c8e296793713a01ffe4a15689dcf4ceb28870b826eb2fb7a532b2d2bc26ffba5dd384518d5c5710fbf07749c7e75b2a1e45b72219745817f6c6495d461596a9f47bee17cb7d80e4708d3ff0e766cb236e83ffef8ee875d179a61429cd7ff573b9d7a359c4a2179a4c2e69a596a3bfc9883c6de9436d12bb8d6fd072103407c725fbfdda595adc2c4775134fb98a831baf8685dce6977708e89cc60712aea0158ee5ad173697bb9c328d8811c29f1f01dec67f36eab597e115b7075bbdb9e3760d3c5266adcbcbbaeaada3e3a162fa08247627ccc3fa76c55aa46a9c6ff674a722ec9455112a7b8092cf8d8f8358227f86a296eeee0deca7fcab75cfc17b94bdd0dce682c39d135334cc0dbc6fa142cbb0f6c875ec5c5ca44071f750e866a7921b88b42bba4d4322bd81c9f0fc21e5db6d522e683b96db2d22b9d69427626344472b5133feccab5618e2f05eb179c7c7f9e23029005f8d90e48ff6c2f15e137d6ba4894484c002a48f4dd536689eabf1c33de2575b4022d97d6325a86b121fd442f3d5e451bd760515b5570a66338092ef2ca51b6198e598371669f7e0ee82a45b74a5f9f5d44219288c6e727e591f70da36cbd62caa77b4b572a82d5effd61e24ed166c38c27a4d0f52309636e75992a4b9dc30bc93fcf8deb2507c91d998b89d568e20bf6ec2da52129e2a5e78ed3065e356c1e4e6af31656179a159b7f53231a0840d62dcfb17a840f0948fc9774e4e56249958f2f7774103356f3df60698873d03c4cf30ad1d5b350917a98e7621de07de77b2a46498da825db39ece46e88bdf4295a6488620cfe3443b0c15a78dc5fe2bd4d9c4aedbd7c398d2252b8d44552349c39a3a618d7585e57f9fe52cc606dc5daf30b478a8d74220915c675909c5488f70b4b2511dc9f4acec90c73d3e1afa15ee58aad56ccb5e139d20fcdd750ddd437198e17c55257606505eac12f0275a6433e16ba5bcbf3cb63cf174ccd8487d908f794444c4e21e183fd01ec85e5b92d65ad94a7d08bde0c440ca3eaf7e8ea193368a98c0446ef202090614f4483e233374b73776aa77181ab1d9fe8e7c1613fa8c59a082e1bfee723b4078b8d3f8b0d66ec2f9bd11ceaf9bad4d7240858ba1bdd26423ade125e4e6d7d237fe2b0fae0ac7bf45f507c2c5d1790d1e36980e725df0a22e24", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) 00:46:56 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) keyctl$KEYCTL_WATCH_KEY(0x2, r4, r3, 0x31) 00:46:56 executing program 1: r0 = socket(0x26, 0x1, 0x9) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x4ed1, 0x4) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) socket(0x26, 0x1, 0x9) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x4ed1, 0x4) (async) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) (async) 00:46:56 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, r0, 0xc1) 00:46:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xc1, 0x400800) (rerun: 64) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x14, 0xbb1, 0x0, 0x0, 0x335, 0xffffffffffffffff, 0x7, '\x00', 0x0, r0, 0x5, 0x2, 0x1}, 0x48) (async) r2 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000180)={{0x8, 0x1f}, 0x100, './file0\x00'}) 00:46:56 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) (async, rerun: 32) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) (async) keyctl$KEYCTL_WATCH_KEY(0x2, r4, r3, 0x31) 00:46:56 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7f, 0x400801) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffff9}) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x4) 00:46:56 executing program 1: r0 = socket(0x26, 0x1, 0x9) (async, rerun: 32) socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 32) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x4ed1, 0x4) (async) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) [ 2816.802305][T29642] Bluetooth: hci6: command 0x0409 tx timeout 00:46:56 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, r0, 0xc1) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, r0, 0xc1) (async) 00:46:56 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(0xffffffffffffffff, 0x5761, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) 00:46:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000100)={0x5, 0x0, [{0x4, 0x3, 0x20, [0x5a498d26, 0xfffffff3, 0x8001, 0x9, 0x6, 0x134f02d6, 0x1, 0x1d]}, {0x4, 0x89, 0x5, [0x3, 0x5, 0x0, 0x1, 0x4, 0xfffff75e, 0x1000, 0x1ff]}, {0xfffffe76, 0x1ff, 0xb29f, [0x4, 0x401, 0x6, 0x0, 0x7, 0x3, 0x6, 0x1]}, {0x60, 0x3a02e42, 0x9, [0xfffffff8, 0x7, 0x1, 0x0, 0x4, 0xffe000, 0x40, 0x6]}, {0x1, 0x6, 0x7fff, [0x7, 0x1f, 0x30, 0x0, 0x7, 0x401, 0x7, 0x3]}]}) 00:46:56 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7f, 0x400801) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffff9}) (async, rerun: 32) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x4) (rerun: 32) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) renameat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 00:46:56 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r2) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) r4 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r4) keyctl$KEYCTL_WATCH_KEY(0x2, r4, r3, 0x31) 00:46:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000100)={0x5, 0x0, [{0x4, 0x3, 0x20, [0x5a498d26, 0xfffffff3, 0x8001, 0x9, 0x6, 0x134f02d6, 0x1, 0x1d]}, {0x4, 0x89, 0x5, [0x3, 0x5, 0x0, 0x1, 0x4, 0xfffff75e, 0x1000, 0x1ff]}, {0xfffffe76, 0x1ff, 0xb29f, [0x4, 0x401, 0x6, 0x0, 0x7, 0x3, 0x6, 0x1]}, {0x60, 0x3a02e42, 0x9, [0xfffffff8, 0x7, 0x1, 0x0, 0x4, 0xffe000, 0x40, 0x6]}, {0x1, 0x6, 0x7fff, [0x7, 0x1f, 0x30, 0x0, 0x7, 0x401, 0x7, 0x3]}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000100)={0x5, 0x0, [{0x4, 0x3, 0x20, [0x5a498d26, 0xfffffff3, 0x8001, 0x9, 0x6, 0x134f02d6, 0x1, 0x1d]}, {0x4, 0x89, 0x5, [0x3, 0x5, 0x0, 0x1, 0x4, 0xfffff75e, 0x1000, 0x1ff]}, {0xfffffe76, 0x1ff, 0xb29f, [0x4, 0x401, 0x6, 0x0, 0x7, 0x3, 0x6, 0x1]}, {0x60, 0x3a02e42, 0x9, [0xfffffff8, 0x7, 0x1, 0x0, 0x4, 0xffe000, 0x40, 0x6]}, {0x1, 0x6, 0x7fff, [0x7, 0x1f, 0x30, 0x0, 0x7, 0x401, 0x7, 0x3]}]}) (async) 00:46:56 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7f, 0x400801) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffff9}) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=0x1, 0x4) 00:46:56 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="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", 0x1000, r0) 00:46:56 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, r0, 0xc1) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) renameat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 00:46:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000100)={0x5, 0x0, [{0x4, 0x3, 0x20, [0x5a498d26, 0xfffffff3, 0x8001, 0x9, 0x6, 0x134f02d6, 0x1, 0x1d]}, {0x4, 0x89, 0x5, [0x3, 0x5, 0x0, 0x1, 0x4, 0xfffff75e, 0x1000, 0x1ff]}, {0xfffffe76, 0x1ff, 0xb29f, [0x4, 0x401, 0x6, 0x0, 0x7, 0x3, 0x6, 0x1]}, {0x60, 0x3a02e42, 0x9, [0xfffffff8, 0x7, 0x1, 0x0, 0x4, 0xffe000, 0x40, 0x6]}, {0x1, 0x6, 0x7fff, [0x7, 0x1f, 0x30, 0x0, 0x7, 0x401, 0x7, 0x3]}]}) 00:46:56 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) 00:46:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) 00:46:56 executing program 3: syz_open_dev$ptys(0xc, 0x3, 0x1) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:46:56 executing program 5: ioprio_set$uid(0x0, 0xee00, 0x4007) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:46:56 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) renameat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 00:46:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) 00:46:56 executing program 5: ioprio_set$uid(0x0, 0xee00, 0x4007) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:46:56 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:46:56 executing program 3: syz_open_dev$ptys(0xc, 0x3, 0x1) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) 00:46:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0), 0x40100, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x5, 0x7, 0x80000000, 0x2104, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) read$FUSE(r6, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x4, 0x1, 0x9, 0x9, 0x9, 0x80, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x13278, 0x60, &(0x7f0000000140)=""/96, 0x41100, 0x3, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f0000000200)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x10, 0x9, 0x1f}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r6, r0, r0]}, 0x80) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) 00:46:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x9, 0x4) (async) 00:46:57 executing program 5: ioprio_set$uid(0x0, 0xee00, 0x4007) (async) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0), 0x40100, 0x0) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x5, 0x7, 0x80000000, 0x2104, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) (rerun: 64) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (rerun: 32) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async) read$FUSE(r6, &(0x7f0000002200)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x4, 0x1, 0x9, 0x9, 0x9, 0x80, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x13278, 0x60, &(0x7f0000000140)=""/96, 0x41100, 0x3, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f0000000200)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x10, 0x9, 0x1f}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r6, r0, r0]}, 0x80) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r0) 00:46:57 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/56, 0x38) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_WATCH_KEY(0x3, r0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 3: syz_open_dev$ptys(0xc, 0x3, 0x1) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) 00:46:57 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 00:46:57 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x2b, 0x5b, 0x1c, 0x22, 0x27, 0x22]}, 0xe, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)={0x3, 0x0, @c}, 0x29, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) 00:46:57 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000)=r1, 0x1) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/56, 0x38) (async, rerun: 32) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async, rerun: 32) keyctl$KEYCTL_WATCH_KEY(0x3, r0, 0xffffffffffffffff, 0x0) (rerun: 32) 00:46:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0), 0x40100, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x5, 0x7, 0x80000000, 0x2104, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, 0x0) (async, rerun: 32) read$FUSE(r6, &(0x7f0000002200)={0x2020}, 0x2020) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@alu={0x4, 0x1, 0x9, 0x9, 0x9, 0x80, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0x13278, 0x60, &(0x7f0000000140)=""/96, 0x41100, 0x3, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f0000000200)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x10, 0x9, 0x1f}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[r0, r3, r4, r5, r6, r0, r0]}, 0x80) 00:46:57 executing program 3: pipe2$watch_queue(&(0x7f0000000000), 0x80) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0xae2b4cc23d34a912, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x2b, 0x5b, 0x1c, 0x22, 0x27, 0x22]}, 0xe, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)={0x3, 0x0, @c}, 0x29, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x2b, 0x5b, 0x1c, 0x22, 0x27, 0x22]}, 0xe, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)={0x3, 0x0, @c}, 0x29, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) (async) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 00:46:57 executing program 1: socket(0x23, 0x0, 0x7) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x15) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 00:46:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) ioctl$NBD_DISCONNECT(r0, 0xab08) 00:46:57 executing program 5: read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/56, 0x38) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_WATCH_KEY(0x3, r0, 0xffffffffffffffff, 0x0) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/56, 0x38) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x3, r0, 0xffffffffffffffff, 0x0) (async) 00:46:57 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x2b, 0x5b, 0x1c, 0x22, 0x27, 0x22]}, 0xe, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) r1 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)={0x3, 0x0, @c}, 0x29, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @auto=[0x2b, 0x5b, 0x1c, 0x22, 0x27, 0x22]}, 0xe, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)={0x3, 0x0, @c}, 0x29, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x800) (async) 00:46:57 executing program 3: pipe2$watch_queue(&(0x7f0000000000), 0x80) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0xae2b4cc23d34a912, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0xae2b4cc23d34a912, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) (async) 00:46:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) ioctl$NBD_DISCONNECT(r0, 0xab08) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) 00:46:57 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, @default, @bpq0, 0x2, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x101, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_open_dev$ndb(&(0x7f00000003c0), 0x0, 0x48181) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x5, 0x7c}, 0x100, './file0\x00'}) 00:46:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async, rerun: 64) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x400000) (rerun: 64) ioctl$NBD_DISCONNECT(r0, 0xab08) 00:46:57 executing program 3: pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0xae2b4cc23d34a912, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) 00:46:57 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) socketpair(0x1e, 0x800, 0x6, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r3, &(0x7f0000000380)={{0x3, @rose}, [@bcast, @default, @default, @remote, @null, @netrom, @netrom]}, &(0x7f0000000400)=0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000100)=0x8, 0x4) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000080)={r1, 0x2}) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000200)=0x7fffffff, 0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) io_uring_setup(0x6ac, &(0x7f0000000180)={0x0, 0xd685, 0x4, 0x0, 0x8f, 0x0, r4}) ioctl$SIOCNRDECOBS(r1, 0x89e2) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="96000001007a33bae4037af42161f4d27c65e69bfee058d41dee3d3334d6bd2240c55d9446b118cda3dc3473f07fc748f2c60181936cf1941cba579e817a959666c4c2cbd9df86c4a884fe6bc5d1eb5624bb6bc9a40eae4b596b3172e9efed05ccdfc5546c32ec265cfe4c395c10a49ab0a5f00f13f90406f30076e9102aca600c030f7ad123", @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf25050000000c00050000000000000000000c0006000100000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4001) connect$netrom(r0, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) recvfrom$netrom(r1, &(0x7f0000000240)=""/93, 0x5d, 0x100, &(0x7f00000002c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:46:57 executing program 1: socket(0x23, 0x0, 0x7) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (rerun: 64) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x15) 00:46:57 executing program 0: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) 00:46:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x21) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) ioctl$SIOCNRDECOBS(r2, 0x89e2) 00:46:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) 00:46:57 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) socketpair(0x1e, 0x800, 0x6, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netrom(r3, &(0x7f0000000380)={{0x3, @rose}, [@bcast, @default, @default, @remote, @null, @netrom, @netrom]}, &(0x7f0000000400)=0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000100)=0x8, 0x4) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000080)={r1, 0x2}) (async) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000200)=0x7fffffff, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) io_uring_setup(0x6ac, &(0x7f0000000180)={0x0, 0xd685, 0x4, 0x0, 0x8f, 0x0, r4}) ioctl$SIOCNRDECOBS(r1, 0x89e2) (async) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="96000001007a33bae4037af42161f4d27c65e69bfee058d41dee3d3334d6bd2240c55d9446b118cda3dc3473f07fc748f2c60181936cf1941cba579e817a959666c4c2cbd9df86c4a884fe6bc5d1eb5624bb6bc9a40eae4b596b3172e9efed05ccdfc5546c32ec265cfe4c395c10a49ab0a5f00f13f90406f30076e9102aca600c030f7ad123", @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf25050000000c00050000000000000000000c0006000100000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4001) (async) connect$netrom(r0, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) (async) recvfrom$netrom(r1, &(0x7f0000000240)=""/93, 0x5d, 0x100, &(0x7f00000002c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:46:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x21) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) (async) ioctl$SIOCNRDECOBS(r2, 0x89e2) 00:46:57 executing program 1: socket(0x23, 0x0, 0x7) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x15) socket(0x23, 0x0, 0x7) (async) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0x15) (async) 00:46:57 executing program 0: add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) [ 2818.251115][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2818.880953][T29642] Bluetooth: hci6: command 0x041b tx timeout [ 2820.321054][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2820.961169][T11379] Bluetooth: hci6: command 0x040f tx timeout [ 2822.400985][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2823.040964][T11379] Bluetooth: hci6: command 0x0419 tx timeout [ 2824.480995][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2826.560991][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2828.641899][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2829.291281][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 2829.292906][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 2830.721020][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2832.801014][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2834.890998][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2836.961048][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2839.041056][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2841.121055][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2843.201120][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2843.361097][ T76] block nbd5: Possible stuck request 0000000044009fcf: control (read@0,4096B). Runtime 90 seconds [ 2845.291153][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2847.361044][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2849.441100][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2851.521052][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2853.601268][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2855.681110][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2857.760996][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2859.840979][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2861.921071][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2864.001026][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2866.081174][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2868.161125][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2870.241233][ T3126] Bluetooth: hci4: command 0x0409 tx timeout 00:47:52 executing program 5: keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, @default, @bpq0, 0x2, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x101, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) syz_open_dev$ndb(&(0x7f00000003c0), 0x0, 0x48181) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x5, 0x7c}, 0x100, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x3, 0x0, 0xffffffffffffffff, 0x0) (async) fsopen(&(0x7f0000000140)='pstore\x00', 0x0) (async) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, @default, @bpq0, 0x2, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x101, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) (async) syz_open_dev$ndb(&(0x7f00000003c0), 0x0, 0x48181) (async) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000000)={{0x5, 0x7c}, 0x100, './file0\x00'}) (async) 00:47:52 executing program 4: keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x800) (async, rerun: 64) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (rerun: 64) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000043c0), 0x4) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000043c0), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async, rerun: 64) socketpair(0x1e, 0x800, 0x6, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) getpeername$netrom(r3, &(0x7f0000000380)={{0x3, @rose}, [@bcast, @default, @default, @remote, @null, @netrom, @netrom]}, &(0x7f0000000400)=0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, 0x0) (async) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000100)=0x8, 0x4) read$FUSE(r2, &(0x7f0000002200)={0x2020}, 0x2020) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000080)={r1, 0x2}) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000200)=0x7fffffff, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) io_uring_setup(0x6ac, &(0x7f0000000180)={0x0, 0xd685, 0x4, 0x0, 0x8f, 0x0, r4}) ioctl$SIOCNRDECOBS(r1, 0x89e2) (async) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="96000001007a33bae4037af42161f4d27c65e69bfee058d41dee3d3334d6bd2240c55d9446b118cda3dc3473f07fc748f2c60181936cf1941cba579e817a959666c4c2cbd9df86c4a884fe6bc5d1eb5624bb6bc9a40eae4b596b3172e9efed05ccdfc5546c32ec265cfe4c395c10a49ab0a5f00f13f90406f30076e9102aca600c030f7ad123", @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf25050000000c00050000000000000000000c0006000100000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4001) (async) connect$netrom(r0, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) recvfrom$netrom(r1, &(0x7f0000000240)=""/93, 0x5d, 0x100, &(0x7f00000002c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 00:47:52 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x10, 0x7, 0x0, 0x9, {{0x8, 0x4, 0x0, 0x3, 0x20, 0x66, 0x0, 0x0, 0x29, 0x0, @broadcast, @loopback, {[@ssrr={0x89, 0xb, 0xb8, [@local, @multicast1]}]}}}}}) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @rose, @netrom, @netrom, @null, @remote, @rose, @null]}, &(0x7f0000000100)=0x48, 0x800) connect$netrom(r0, &(0x7f0000000140)={{0x3, @bcast, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) read$proc_mixer(r1, &(0x7f00000001c0)=""/33, 0x21) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2e3) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x1) 00:47:52 executing program 0: add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) 00:47:52 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) (async) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x21) (async) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000000)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) (async) ioctl$SIOCNRDECOBS(r2, 0x89e2) 00:47:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) 00:47:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) 00:47:52 executing program 1: keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x10, 0x7, 0x0, 0x9, {{0x8, 0x4, 0x0, 0x3, 0x20, 0x66, 0x0, 0x0, 0x29, 0x0, @broadcast, @loopback, {[@ssrr={0x89, 0xb, 0xb8, [@local, @multicast1]}]}}}}}) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @rose, @netrom, @netrom, @null, @remote, @rose, @null]}, &(0x7f0000000100)=0x48, 0x800) connect$netrom(r0, &(0x7f0000000140)={{0x3, @bcast, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) read$proc_mixer(r1, &(0x7f00000001c0)=""/33, 0x21) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2e3) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x1) keyctl$KEYCTL_WATCH_KEY(0x5, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x10, 0x7, 0x0, 0x9, {{0x8, 0x4, 0x0, 0x3, 0x20, 0x66, 0x0, 0x0, 0x29, 0x0, @broadcast, @loopback, {[@ssrr={0x89, 0xb, 0xb8, [@local, @multicast1]}]}}}}}) (async) accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @rose, @netrom, @netrom, @null, @remote, @rose, @null]}, &(0x7f0000000100)=0x48, 0x800) (async) connect$netrom(r0, &(0x7f0000000140)={{0x3, @bcast, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) read$proc_mixer(r1, &(0x7f00000001c0)=""/33, 0x21) (async) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2e3) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x1) (async) 00:47:52 executing program 0: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) 00:47:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r1 = fsopen(&(0x7f0000000140)='pstore\x00', 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x8001}}, './file0\x00'}) keyctl$KEYCTL_WATCH_KEY(0x2, 0x0, 0xffffffffffffffff, 0x0) [ 2872.321331][T11379] Bluetooth: hci4: command 0x0409 tx timeout 00:47:52 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffff80000000, 0x200200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) read$FUSE(r3, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r2, &(0x7f0000004240)={0x2020}, 0x2020) read$watch_queue(r1, &(0x7f0000000200)=""/15, 0xf) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f00000001c0)=r4) io_uring_setup(0x81a, &(0x7f0000000000)={0x0, 0x23cd, 0x200, 0x3, 0x2f9, 0x0, r0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) 00:47:52 executing program 0: add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="f014b0c8dc4617abe8a897c2e08a73ee46b012bb", 0x14, 0xffffffffffffffff) add_key(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0x0) [ 2873.441049][ T76] block nbd5: Possible stuck request 0000000044009fcf: control (read@0,4096B). Runtime 120 seconds [ 2874.401144][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2876.481044][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2876.561035][ T7866] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 2878.561176][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2880.641069][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2880.801034][ T7866] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 2882.721064][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2884.801150][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2885.051130][ T7866] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 2886.880997][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2888.961089][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2889.361103][ T7866] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 2890.721409][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 2890.722976][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 2891.041023][T11379] Bluetooth: hci4: command 0x0409 tx timeout [ 2893.121068][T29642] Bluetooth: hci4: command 0x0409 tx timeout [ 2893.601072][ T7866] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 2895.201186][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2895.762999][ T675] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 2895.765316][ T675] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 2895.767341][ T675] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 2895.769483][ T675] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 2895.779460][ T675] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 2895.781488][ T675] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 2895.942742][T11895] chnl_net:caif_netlink_parms(): no params data found [ 2895.989297][T11895] bridge0: port 1(bridge_slave_0) entered blocking state [ 2896.005721][T11895] bridge0: port 1(bridge_slave_0) entered disabled state [ 2896.007747][T11895] device bridge_slave_0 entered promiscuous mode [ 2896.020928][T11895] bridge0: port 2(bridge_slave_1) entered blocking state [ 2896.022719][T11895] bridge0: port 2(bridge_slave_1) entered disabled state [ 2896.024805][T11895] device bridge_slave_1 entered promiscuous mode [ 2896.056780][T11895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2896.059907][T11895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2896.077320][T11895] team0: Port device team_slave_0 added [ 2896.079850][T11895] team0: Port device team_slave_1 added [ 2896.113072][T11895] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2896.114722][T11895] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2896.120773][T11895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2896.138559][T11895] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2896.140259][T11895] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2896.161180][T11895] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2896.241856][T11895] device hsr_slave_0 entered promiscuous mode [ 2896.281079][T11895] device hsr_slave_1 entered promiscuous mode [ 2896.320946][T11895] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2896.322702][T11895] Cannot create hsr debugfs directory [ 2896.443454][T11895] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.527826][T11895] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.621977][T11895] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.712655][T11895] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.870455][T11895] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2896.902105][T11895] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2896.931954][T11895] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2896.995519][T11895] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2897.064949][T11895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2897.069624][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2897.072355][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2897.082392][T11895] 8021q: adding VLAN 0 to HW filter on device team0 [ 2897.091654][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2897.093841][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2897.095809][T11379] bridge0: port 1(bridge_slave_0) entered blocking state [ 2897.097376][T11379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2897.099309][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2897.102031][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2897.104032][T11379] bridge0: port 2(bridge_slave_1) entered blocking state [ 2897.105726][T11379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2897.107641][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2897.109914][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2897.114219][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2897.116583][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2897.118654][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2897.122051][T11379] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2897.127886][T11895] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2897.130323][T11895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2897.134124][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2897.136208][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2897.138214][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2897.140302][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2897.143549][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2897.145682][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2897.150132][T11906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2897.214823][T11895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2897.216962][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2897.218790][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2897.291006][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2897.308808][T11895] device veth0_vlan entered promiscuous mode [ 2897.319158][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2897.321428][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2897.323582][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2897.325926][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2897.329883][T11895] device veth1_vlan entered promiscuous mode [ 2897.340744][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2897.343016][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2897.344946][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2897.359864][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2897.362041][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2897.364224][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2897.368281][T11895] device veth0_macvtap entered promiscuous mode [ 2897.380171][T11895] device veth1_macvtap entered promiscuous mode [ 2897.386845][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.389306][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.399042][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.402259][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.404540][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.406945][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.409201][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.419369][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.421844][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.424293][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.426609][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.428957][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.438032][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2897.440511][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.446025][T11895] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2897.448426][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2897.450411][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2897.453141][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2897.455498][T11195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2897.458670][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.461300][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.463543][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.466114][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.468375][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.470717][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.474102][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.476514][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.478759][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.481823][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.484127][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.486568][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.488907][T11895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2897.491856][T11895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2897.494859][T11895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2897.497128][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2897.499315][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2897.503356][T11895] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.505458][T11895] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.507464][T11895] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.509580][T11895] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.841298][T11906] Bluetooth: hci7: command 0x0409 tx timeout [ 2899.371049][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2899.931070][T11906] Bluetooth: hci7: command 0x041b tx timeout [ 2901.441013][T11906] Bluetooth: hci4: command 0x0409 tx timeout [ 2902.001460][T11906] Bluetooth: hci7: command 0x040f tx timeout [ 2903.521060][T11906] Bluetooth: hci4: command 0x0409 tx timeout [ 2903.521136][ T76] block nbd5: Possible stuck request 0000000044009fcf: control (read@0,4096B). Runtime 150 seconds [ 2904.080967][ T3126] Bluetooth: hci7: command 0x0419 tx timeout [ 2905.600988][T11906] Bluetooth: hci4: command 0x0409 tx timeout [ 2907.681113][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2909.761203][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2911.841290][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2913.920993][ T3126] Bluetooth: hci4: command 0x0409 tx timeout [ 2915.041166][ T27] INFO: task syz-executor.5:11228 blocked for more than 143 seconds. [ 2915.043263][ T27] Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2915.045053][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2915.047130][ T27] task:syz-executor.5 state:D stack: 0 pid:11228 ppid: 3044 flags:0x00000009 [ 2915.049253][ T27] Call trace: [ 2915.050024][ T27] __switch_to+0x180/0x298 [ 2915.059971][ T27] __schedule+0x414/0x5a0 [ 2915.061171][ T27] schedule+0x64/0xa4 [ 2915.062159][ T27] io_schedule+0x38/0xbc [ 2915.063249][ T27] folio_wait_bit_common+0x458/0xa44 [ 2915.064518][ T27] do_read_cache_folio+0x78/0x588 [ 2915.065686][ T27] read_cache_folio+0x40/0x54 [ 2915.066835][ T27] read_part_sector+0x60/0x1d8 [ 2915.067921][ T27] adfspart_check_POWERTEC+0x4c/0x360 [ 2915.069217][ T27] bdev_disk_changed+0x364/0x66c [ 2915.070386][ T27] blkdev_get_whole+0x1b0/0x208 [ 2915.078853][ T27] blkdev_get_by_dev+0x178/0x2fc [ 2915.079981][ T27] blkdev_open+0x84/0xd8 [ 2915.081143][ T27] do_dentry_open+0x330/0x6d0 [ 2915.082236][ T27] vfs_open+0x38/0x48 [ 2915.083175][ T27] path_openat+0xe34/0x11c4 [ 2915.084268][ T27] do_filp_open+0xdc/0x1b8 [ 2915.085309][ T27] do_sys_openat2+0xb8/0x22c [ 2915.086425][ T27] __arm64_sys_openat+0xb0/0xe0 [ 2915.087587][ T27] el0_svc_common+0x138/0x220 [ 2915.088679][ T27] do_el0_svc+0x48/0x164 [ 2915.089675][ T27] el0_svc+0x58/0x150 [ 2915.090644][ T27] el0t_64_sync_handler+0x84/0xf0 [ 2915.099141][ T27] el0t_64_sync+0x18c/0x190 [ 2915.100230][ T27] [ 2915.100230][ T27] Showing all locks held in the system: [ 2915.102335][ T27] 1 lock held by rcu_tasks_kthre/11: [ 2915.103583][ T27] #0: ffff80000d433568 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x3c/0x450 [ 2915.106113][ T27] 1 lock held by rcu_tasks_trace/12: [ 2915.107572][ T27] #0: ffff80000d433bb8 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x3c/0x450 [ 2915.110531][ T27] 1 lock held by khungtaskd/27: [ 2915.118955][ T27] #0: ffff80000d433440 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x4/0x48 [ 2915.121450][ T27] 1 lock held by udevd/2560: [ 2915.122529][ T27] 2 locks held by getty/2711: [ 2915.123590][ T27] #0: ffff0000c6fd5098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x28/0x58 [ 2915.125952][ T27] #1: ffff80000f6162f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x19c/0x89c [ 2915.128312][ T27] 1 lock held by syz-executor.5/11228: [ 2915.129568][ T27] #0: ffff0000c4cfd4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xfc/0x2fc [ 2915.141475][ T27] 1 lock held by syz-executor.5/11794: [ 2915.142729][ T27] #0: ffff0000c4cfd4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xfc/0x2fc [ 2915.145086][ T27] 1 lock held by syz-executor.5/11812: [ 2915.146378][ T27] #0: ffff0000c4cfd4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xfc/0x2fc [ 2915.148690][ T27] 1 lock held by syz-executor.5/11918: [ 2915.149968][ T27] #0: ffff0000c4cfd4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xfc/0x2fc [ 2915.159504][ T27] [ 2915.160030][ T27] ============================================= [ 2915.160030][ T27] [ 2915.162411][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 2915.164089][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 [ 2915.166454][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 [ 2915.168794][ T27] Call trace: [ 2915.169549][ T27] dump_backtrace+0x1c4/0x1f0 [ 2915.170688][ T27] show_stack+0x2c/0x54 [ 2915.171689][ T27] dump_stack_lvl+0x104/0x16c [ 2915.172820][ T27] dump_stack+0x1c/0x58 [ 2915.173803][ T27] panic+0x218/0x50c [ 2915.174762][ T27] hung_task_panic+0x0/0x2c [ 2915.175911][ T27] kthread+0x12c/0x158 [ 2915.176896][ T27] ret_from_fork+0x10/0x20 [ 2915.178018][ T27] SMP: stopping secondary CPUs [ 2915.179164][ T27] Kernel Offset: disabled [ 2915.180217][ T27] CPU features: 0x00000,02070084,26017203 [ 2915.181752][ T27] Memory Limit: none [ 2915.460776][ T27] Rebooting in 86400 seconds..