0000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) creat(&(0x7f0000000040)='./file0\x00', 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) getuid() lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 880.094393] nla_parse: 30 callbacks suppressed [ 880.094400] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) creat(&(0x7f0000000040)='./file0\x00', 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) getuid() 22:27:32 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) creat(&(0x7f0000000040)='./file0\x00', 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) creat(&(0x7f0000000040)='./file0\x00', 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 3: creat(0x0, 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 3: creat(0x0, 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 2: lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) getuid() lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) getuid() 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) creat(&(0x7f0000000040)='./file0\x00', 0xfd) 22:27:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 3: creat(0x0, 0xfd) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 2: lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 2: lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 2: creat(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 2: creat(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 4: lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 2: creat(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 4: lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 4: lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 4: creat(0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 4: creat(0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x44, 0x0) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 4: creat(0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x94, 0x3, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}, @NFTA_CHAIN_USERDATA={0x28, 0xc, "782836458d71d5908706b053ed55c0b8ccb6a8b1be6ddc4065ba461f672d8aa925cd7e76"}]}], {0x14}}, 0x178}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x44, 0x0) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(0x0, &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x44, 0x0) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f00000018c0)=@ng={0x4, 0x13, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x6c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_HOOK={0x58, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x7749d9cc}]}]}], {0x14}}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(0x0, &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(0x0, &(0x7f00000001c0), 0x0, 0x0, 0x2) 22:27:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x44, 0x0) 22:27:33 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2) 22:27:33 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x44, 0x0) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng={0x4, 0x0, "216ab56f8451e7aa99dd8e"}, 0xd, 0x1) 22:27:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2) 22:27:33 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0x132}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}, {{&(0x7f0000000540)=@rc={0x1f, @none}, 0x0, &(0x7f0000000780)=[{&(0x7f00000005c0)=""/85}, {&(0x7f0000000640)=""/91}, {&(0x7f00000006c0)=""/4}, {&(0x7f0000000700)=""/12}, {&(0x7f0000000740)=""/18}], 0x0, &(0x7f0000000800)=""/4096}, 0x1c00000}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng, 0x2, 0x1) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), &(0x7f00000018c0)=@ng, 0x2, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 2: lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 3: mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e20,timeout=0000002,sq=0x000000007fffffff,timeout=0x0000000000008001,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',seclabel,\x00']) creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)=@sha1={0x1, "eab5c1e2863fa6bcfc7526e74ce7a68f6aaf5d8a"}, 0x15, 0x2) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 2: lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: creat(0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x6) 22:27:33 executing program 2: lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:33 executing program 2: creat(0x0, 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 2: creat(0x0, 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/164, 0xa4}], 0x4, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 2: creat(0x0, 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/35, 0x23}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(0x0, &(0x7f0000001880), 0x0, 0x0, 0x1) 22:27:33 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r5, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:33 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1) 22:27:33 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) 22:27:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0) 22:27:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:33 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x28, 0x18, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0xe4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:34 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000040, 0x0) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001880), 0x0, 0x0, 0x0) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x0, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:34 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:34 executing program 3: socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:34 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0x64}}, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: socketpair(0x0, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 3: socketpair(0x0, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:35 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:35 executing program 3: socketpair(0x0, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: socketpair(0x26, 0x0, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: socketpair(0x26, 0x0, 0x0, &(0x7f00000003c0)) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: socketpair(0x26, 0x0, 0x0, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:35 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:35 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800), 0x0, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000500)={0x77359400}) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:35 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:35 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}}], {0x14}}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="16d3afedfb8d0c03f3431da12d7c537051a79d8c0512f5e8fe0be6da30627dd91278836e74aa1bfcbb02d3019b99c0d0a7a48ddf9ac7ae8c951fd822ba47e3d0400aa34b6e0a7255694087d14275507ecc76a64c6f4d0321abe0f397ae6068bf1131040379ce8e85e4682ba41d97037bcaefcc4f6cd6b5d2aeda9b203729ddef5f8cb6cd236c43ca24ef09f53e2fc03d174d90bc56a7858a540b572bd9e64b2b5afbd0fb5f28d8ff015a823fafea97ddce1076c0b4d4313c322679ab75a41aa19ba520c7039f6b0d1f6c706b7f9489d69f125a23956d376772185cabfe47254dcc253f2960fa730325091d4b94e83fbb6a143f6452cb798bb2656862c63d80366091fcfe095db0afa2591d7bdd8c55d3a79cda3a86be0ecadf443795fc52b7ad9cefe8089f5dd759e026b139475db3cc059ac0ef752c29238da301388b338ab433dc5250de44620a21082aa72cbb92203648f57ab65031967376463ca34913075e67e00bef69f391422bf6a0179d5f5bd413ef94432e301d7590bb4637a388bd0e050cfc3641876140abea1094c6401e8a4ef82fea0b04f4876a5049cba11768588aa30f7cc4c98ff2c8955c0e175ba5fb850c81a5a9729f7cae46bb6c8da1a5840bfea44a5d83676d65c19aa0328e665bfee0c4dc823d04babd306df6a41b38fb39513e62218d3dce6a11a4f696b0899b4073469593f32fa2935eabcf1d7fee3c43d088734792b4df9c693d35dc3573ee6ec3fed57dc56bc9bedbce5503ace0d4c2da6f707d9ee313eab33c4f6b496a71541830e13f9fcfeb475c547b38149c3531e7017c40ce10f22902cc04b5edd222ced1c76c09c3f1efd3aa3bc95422a9f3e635f008c25325da901773b8f7ba64aefbf4e51ee551f19c28062603947772d35881633e5f2beb20489256dff77430619be5a6c3e4cd1c8018cda458789681282e9966395c606d350f3b93bf1b20e4dfffd6125d7fe67570e56044bd77d76dd600898550342f5708a85363536f086b94515b6b7bff2f32420886f8c47e22eef212cb03311f4c62f3c3b36f9db6e133868bf6a8e6e8ace1492596ea8a41c20a856b3cd36e6d92f48925d30e9667fb4dffb203855da483c5db5948dee24f7dd0180e36c79e418be5d83a295a62dfd94cf32fe66fdca7e410fc6f95b28375b9168fb07e792b5543c4d90992f03dbaf37eb0749639ccf6cb81765a8bc90984eb4d641eccdb241db8654a0c4e87c81f27c946cd20bbaf178c336a122614c670a4565496049342f53e31174e614d84b6617c0c9447f7906783b88f21811d896aaba80db4ecc4ea25efee25abc0fa60eb98cdc91da84fb66bf3d4e47b4bdfddd2227e4bbf0ac67b501128a1668677e11cd2ab80c694ccb48051a4e8c3ee8b07dc2d1771a04d91ac026170de2c191abf049cad3ceb41b60e3514d4cd440d7e11b41f3abd2a9b726cb0779eaade82a401e6e7be8f91ede17ce10d0fa3cfe13f9b370c8059fe564de3e00cf02a9cf3e91171b6d9cff8d2134adc4645a208a71fff7e18d585456d489169e5b27b0d138b4934ff555703f7130c1e84e65837b4620ebca930c181fd09805fabab1edf97c1a53ff7d9bc281da258e989822325dba38b7400fc8c203d90394dfaa01d1e4e758010da16ab6dc6e5d3e2c52a7874a2dd86985296aef495c4375f7875e191ee85d3773dce76de7c59cead17dec2cfe68a4e82948bb3fe0eb1120a91ce64fcef04d79737d0793fa528abcd42ae50a78c890c588fa503022ad22bdf6c72ed7a19ce827c0c8fb2574711767a1fe289acd171925685c5dbd6517b136fa349e309d8cc993199fe39943cf9f25225e7840b223f1cd853bebe18173d15ab3915b8f73334afa3a3a0d1b469d24d13134ef9b195b867345fa9eb9bfc0332963f3a09557844d6e1b19e617bed54313d4b2fd811f79ecd0b3e85c093d666809f130d0b2c464bc9090aa8e2c5065aae0425860566be7a11230f10e8f3f0bce4e4ce61bc4d803d8365c1f42b729019381d5df60fb2d0d2eb3a266ac729e6f23a17a69e330b64e0987a17030b442e62ba03e0eed06d5af70abfc5a1ed43b9a076871362eb1057aeaa764cdb59d3b9bdc89f3dfbe18b10b6757cee8b677dd3e81eeaff59fcb2f5113f6dd59b394af9ba3aaf98fb946e98a3392e2419439f1c32376569448d49a6315c2b234ee3842608e7074387c52fe8b59fbcafe4be435ab84a037bc64d0a83045cee83d38452e5cbbe675021d9a7823b10dcbb15411f4616d5af83f17a12cb54bc04e19c942d510a39476b0c7e16d489f9f51b6fc8fdee5904a8dcf60d5bb6f984b4c9ce17ae7553488eaeb7dcec6ce182d58a63a73813ea3bbbf55022f94fd0ebc8fcdf09ba063a982a29716a646c80bc9b3a463999bb21831ed0d803233e1906eb8f7d6ebe3cf311befdffd6e86d739c41aad984084eafc265affece682f0036029982c90ae5118aff093788c6b4e223ab72d8fb9664f30ac23f5b1a300090c74f9299f82e63a6cae31477cd9f8f7ba992048390cf0f301ab2247a8d82f46b1a76fd9bf8bff8eadf4e442b1474d4f4b4f1b6d74cf135381378d6a883b534c04dd68c2923636c05868cb2cb6eda948f5ceb9387d6ae2511ab2ad93d9cf27504b71d6b6e6d8930bc91f4910c9d4c835eaa41c9bd73e6a9657adc904f1557e36dbb92f4550305f6e0ac2a906001309bd2d2d77388e72eeb8afe81a467ae0f211b8526765b18100b60fd4e09ee01b8b1b7054a71e87a05be39d1d76433c7e2a943626e3a9bc226edec5fce4da9eafbc20c25457050114424bc9225cc082c1c33367da6ea8c9e8b63fdb4e7ecb4658ce2412346138175bac6c9f65960c68408043747e49f9e4b8bb09d1068b84f0eea02eccaedba59c3df209ebd71814783328027f6c19610c7bf32c934faa1f5e8e87aff2be018eadeb1606f71f3b12f3b6b227e6a00cc10ab06affdd75074b733946ca93c3c62f4a6f74b8af085e6af7e63ebd4fd3287cdd1cf695fc044266dac3495af33db37af0d89bb6722fa391f56437de089ce90ac4199ee906cbd64567efe0d83296a77b2995dbe40e427f0de6b8534f7c056abf7daccfaa9f24fa37d0e304a31f7403cb87a5f27e00f81408401cc0d6dbce6e70516cc10f8803ce4e34a9b6ba3387edd0298b180f1953bc55b05a0f446c0ee1387fe86986d4b41dca8f598fdb60c070a91c5b1759eb8a9380fadb45dcd0920251c3c7cf45ff420cbca2af189c0d2822bd83706ad33bbe141bc734c0408d7596b2818ffd2315dba715830f0a61c69a09a1a19166ff42fe3f9705d17e8b001c562e2f4c4c3eb6e7b2a39f6f04e4629ddd9c7a70ff9bac017ac8ee7342533f9cfd65a220a9d166d04fdb44e0ddf956602b5189de0008312e5beb3f0a0a0b02530762f6f06749bb666254d932a3832d13fa6dd9e77d202094266e80cb2be5b59b6949b16056344cd96f35fb9ff1491e254dd81a6ffdda6d4cb8c3f6f8435024f63aea941ab1cb9d5a18eddd0852ab8af85a45aebbf318ad5118bf93b2e0927362cd3e1088f912d1b259cc78ba073c71e3476fab5ea1197eeefa88ab816b383dd836223a2d11273ecc19839c75e6c62187b08a022fbb5c537595393acd434eb2f0c1deeff25f30c02098b2bb73558294d47aa7d6d3dbc645629c39d74632723c3542d39a67c1323dc1b975efc3f590cf71447d89cbb8eb944ce41ae41fa27962ac97b255357ad0a237967ba79e921ef20b329993943a85b87ef4c80e7cf35d556fd127cd7d0aa347db3daa79c6aa0cb913d1b55e1cf75e68e679661b9b5a9a3339e5051e34d75aa537ef99a7c785bfb97bbab3b92629053cab34571c2a5d312c36a22af510f5f9eeafb393973053369dd8712bc33fc133eb30ec0e4214e65b4874032e6f4da509d4839670af748b13391addf6c3ec7d076550c04074cbf97331dca2b51c6b09403e6916cb6bb0348abc3193bdd82cab122f42d469906d5cc2849ff801f6c32f336011b3c9d2e18776c690c0fb59f80168848c76490ccac7b191861cfa80305aa07a633d2b836721a342acde6f2eb1c1acbcc152a45135a0c632d1d318355901b82d910996b9fcbbbfa1855a1b32c018a69ec6435da077df2f8498cdc41980c750615f8487c718deb9e76f1172b9346c5d918772337be851ba191f4201019a4bbe361b8a18c5207fbd2800d66f760dd0835c1ff0de1cfa1ab55ca6d16cd452f78fe58c767947fa13a3a147882c08f51927183a9af29da14b6599a54b781c2a797caa5d95b530f5a8037f42d1dd15dc6dc59e0ae2274bdb6a30ae92548f572a20c9d0c486bbd0660517a88fa4cd151a45668cf73d1dc3bf005980e71c27c899e8487c3830a161e318d7caeed5a6cde9dbcc8478d1577cb383fad993ced184530ae32aee48ef0303f739a4d8e5b8592149d99f64fbe8bcfe9f6f7b78df088c4fd8f078d654ef2a380bc24de36bd537e0a5652db2da34640d3b6eb073644a1d81f0d8c727890ed0f60a74040f3094a7f5571cb2fd996bde099b0aff2a32abea8a66aa1f5afd62077189112b6d8ccbccba75e00b2a266e2877a9e269bfb32b94e0ee82bae28b986caf091cc08f4075011ee8bffeea4484e63b477913727f559903a8610255e504b947adf4797b5a99851378d25323c3b1509b8fdb4d5447e011fd2712fd8d9499eec18b13bc69460da5703f6d65052ba2e62da7314e4aaa99de0b142416408ac44e26e59e31f212ef6799ddc379584672c6583e514bce1d34f472e3b0402af970cc07d6bd15b78a92cdf15a6033fb2ecdab0c772906479e022352617832b6306798e1895b910f36a735375208434d4fe55c770a806245f5529857240576e18cbd25fb7401ff817ece322efa85654d7085c998b7abfa1109c0d50295c17ff0292cc2ffacddb7dd89615dac27237b720f4ea7b837bbe30e75b214de72a38104c0e06ad4374b67c3daf5ebbd977d58fe403c004bde9db59e535a05c86f4a1f83621badb4f53ed834f5288a055149e8749960fd0af1b713cb7c5c33d0d1beeded3c98d1c058b7dc13c3bdfdf2708322fe5ba1840986d7ca8dd62a60ad0014e9eb8e739d09d14878d666a39ef7322c6ea1332865998c7f337d6a3f09d10678211f1d77686e6bbd941d9b2311524881bb3242354c3638855f7a36e1bcfebb2b34cab70f33b0142fb8ab04b31c68c8fe6f6fc3f416994b0a42bd370f411d7fde3073fea1c8654ec57f37fcc33c7413b87e48390960a9f65d95ce52f3114d022563be2c7399b0d26c84efd952e21edc35366bd8d62b625f185686e615a136aca009c0512986a37a859f4ed3ada2ca3390665b3924eda642f7cecc0df877dc866ea4d1fd11320acfd2ace632fb5f5ce51247a8ff302538cfe4690ad0dfa2e0af7094e5e6a0d2762c2d1490973906a9c0dce9145b65107ba2b2679f3f68aedc752b75be86c8509d2647670b02d739595d0eff3e6064bee472f4bae82c0fb73758348243b5ec70038e05ea9e16ff5282a3699be4d06e12f839a911ebfdbd204865461f5fcc30f6d759e4eea587ec61ec5c2030606dad2cdae1626a5344e2ce208cdf3efa34121afc377d0c559c9e991ee0f92686f6b50a06c69a938c7ce136202463d377c9050147670c05205120f46bbd4610927bd77010e9e8a412e1fca553971eeb66c361b7a4bdf0279d3e1b5d033effed49a5bd909123ecdb84a17bf4d6dfaa81e3086f2061a842794d8a30276251fbac1567c6b9e9a6b9f3a6a707fdf52e551270c5b23fc21677c1f27c3e8", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:35 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:35 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:35 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r5, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) 22:27:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5, 0x0, 0x0, {0x5}}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0x50}}, 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:36 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:36 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) 22:27:36 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:36 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}, @NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x201}], {0x14}}, 0xb0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r3 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r2) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r2) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r6, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="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", &(0x7f0000001700)=""/65) connect$unix(r1, &(0x7f0000001980)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000580)={r5, 0x1000, 0x41}, &(0x7f0000000680)={'enc=', 'oaep', ' hash=', {'md4-generic\x00'}}, &(0x7f0000000700)="16d3afedfb8d0c03f3431da12d7c537051a79d8c0512f5e8fe0be6da30627dd91278836e74aa1bfcbb02d3019b99c0d0a7a48ddf9ac7ae8c951fd822ba47e3d0400aa34b6e0a7255694087d14275507ecc76a64c6f4d0321abe0f397ae6068bf1131040379ce8e85e4682ba41d97037bcaefcc4f6cd6b5d2aeda9b203729ddef5f8cb6cd236c43ca24ef09f53e2fc03d174d90bc56a7858a540b572bd9e64b2b5afbd0fb5f28d8ff015a823fafea97ddce1076c0b4d4313c322679ab75a41aa19ba520c7039f6b0d1f6c706b7f9489d69f125a23956d376772185cabfe47254dcc253f2960fa730325091d4b94e83fbb6a143f6452cb798bb2656862c63d80366091fcfe095db0afa2591d7bdd8c55d3a79cda3a86be0ecadf443795fc52b7ad9cefe8089f5dd759e026b139475db3cc059ac0ef752c29238da301388b338ab433dc5250de44620a21082aa72cbb92203648f57ab65031967376463ca34913075e67e00bef69f391422bf6a0179d5f5bd413ef94432e301d7590bb4637a388bd0e050cfc3641876140abea1094c6401e8a4ef82fea0b04f4876a5049cba11768588aa30f7cc4c98ff2c8955c0e175ba5fb850c81a5a9729f7cae46bb6c8da1a5840bfea44a5d83676d65c19aa0328e665bfee0c4dc823d04babd306df6a41b38fb39513e62218d3dce6a11a4f696b0899b4073469593f32fa2935eabcf1d7fee3c43d088734792b4df9c693d35dc3573ee6ec3fed57dc56bc9bedbce5503ace0d4c2da6f707d9ee313eab33c4f6b496a71541830e13f9fcfeb475c547b38149c3531e7017c40ce10f22902cc04b5edd222ced1c76c09c3f1efd3aa3bc95422a9f3e635f008c25325da901773b8f7ba64aefbf4e51ee551f19c28062603947772d35881633e5f2beb20489256dff77430619be5a6c3e4cd1c8018cda458789681282e9966395c606d350f3b93bf1b20e4dfffd6125d7fe67570e56044bd77d76dd600898550342f5708a85363536f086b94515b6b7bff2f32420886f8c47e22eef212cb03311f4c62f3c3b36f9db6e133868bf6a8e6e8ace1492596ea8a41c20a856b3cd36e6d92f48925d30e9667fb4dffb203855da483c5db5948dee24f7dd0180e36c79e418be5d83a295a62dfd94cf32fe66fdca7e410fc6f95b28375b9168fb07e792b5543c4d90992f03dbaf37eb0749639ccf6cb81765a8bc90984eb4d641eccdb241db8654a0c4e87c81f27c946cd20bbaf178c336a122614c670a4565496049342f53e31174e614d84b6617c0c9447f7906783b88f21811d896aaba80db4ecc4ea25efee25abc0fa60eb98cdc91da84fb66bf3d4e47b4bdfddd2227e4bbf0ac67b501128a1668677e11cd2ab80c694ccb48051a4e8c3ee8b07dc2d1771a04d91ac026170de2c191abf049cad3ceb41b60e3514d4cd440d7e11b41f3abd2a9b726cb0779eaade82a401e6e7be8f91ede17ce10d0fa3cfe13f9b370c8059fe564de3e00cf02a9cf3e91171b6d9cff8d2134adc4645a208a71fff7e18d585456d489169e5b27b0d138b4934ff555703f7130c1e84e65837b4620ebca930c181fd09805fabab1edf97c1a53ff7d9bc281da258e989822325dba38b7400fc8c203d90394dfaa01d1e4e758010da16ab6dc6e5d3e2c52a7874a2dd86985296aef495c4375f7875e191ee85d3773dce76de7c59cead17dec2cfe68a4e82948bb3fe0eb1120a91ce64fcef04d79737d0793fa528abcd42ae50a78c890c588fa503022ad22bdf6c72ed7a19ce827c0c8fb2574711767a1fe289acd171925685c5dbd6517b136fa349e309d8cc993199fe39943cf9f25225e7840b223f1cd853bebe18173d15ab3915b8f73334afa3a3a0d1b469d24d13134ef9b195b867345fa9eb9bfc0332963f3a09557844d6e1b19e617bed54313d4b2fd811f79ecd0b3e85c093d666809f130d0b2c464bc9090aa8e2c5065aae0425860566be7a11230f10e8f3f0bce4e4ce61bc4d803d8365c1f42b729019381d5df60fb2d0d2eb3a266ac729e6f23a17a69e330b64e0987a17030b442e62ba03e0eed06d5af70abfc5a1ed43b9a076871362eb1057aeaa764cdb59d3b9bdc89f3dfbe18b10b6757cee8b677dd3e81eeaff59fcb2f5113f6dd59b394af9ba3aaf98fb946e98a3392e2419439f1c32376569448d49a6315c2b234ee3842608e7074387c52fe8b59fbcafe4be435ab84a037bc64d0a83045cee83d38452e5cbbe675021d9a7823b10dcbb15411f4616d5af83f17a12cb54bc04e19c942d510a39476b0c7e16d489f9f51b6fc8fdee5904a8dcf60d5bb6f984b4c9ce17ae7553488eaeb7dcec6ce182d58a63a73813ea3bbbf55022f94fd0ebc8fcdf09ba063a982a29716a646c80bc9b3a463999bb21831ed0d803233e1906eb8f7d6ebe3cf311befdffd6e86d739c41aad984084eafc265affece682f0036029982c90ae5118aff093788c6b4e223ab72d8fb9664f30ac23f5b1a300090c74f9299f82e63a6cae31477cd9f8f7ba992048390cf0f301ab2247a8d82f46b1a76fd9bf8bff8eadf4e442b1474d4f4b4f1b6d74cf135381378d6a883b534c04dd68c2923636c05868cb2cb6eda948f5ceb9387d6ae2511ab2ad93d9cf27504b71d6b6e6d8930bc91f4910c9d4c835eaa41c9bd73e6a9657adc904f1557e36dbb92f4550305f6e0ac2a906001309bd2d2d77388e72eeb8afe81a467ae0f211b8526765b18100b60fd4e09ee01b8b1b7054a71e87a05be39d1d76433c7e2a943626e3a9bc226edec5fce4da9eafbc20c25457050114424bc9225cc082c1c33367da6ea8c9e8b63fdb4e7ecb4658ce2412346138175bac6c9f65960c68408043747e49f9e4b8bb09d1068b84f0eea02eccaedba59c3df209ebd71814783328027f6c19610c7bf32c934faa1f5e8e87aff2be018eadeb1606f71f3b12f3b6b227e6a00cc10ab06affdd75074b733946ca93c3c62f4a6f74b8af085e6af7e63ebd4fd3287cdd1cf695fc044266dac3495af33db37af0d89bb6722fa391f56437de089ce90ac4199ee906cbd64567efe0d83296a77b2995dbe40e427f0de6b8534f7c056abf7daccfaa9f24fa37d0e304a31f7403cb87a5f27e00f81408401cc0d6dbce6e70516cc10f8803ce4e34a9b6ba3387edd0298b180f1953bc55b05a0f446c0ee1387fe86986d4b41dca8f598fdb60c070a91c5b1759eb8a9380fadb45dcd0920251c3c7cf45ff420cbca2af189c0d2822bd83706ad33bbe141bc734c0408d7596b2818ffd2315dba715830f0a61c69a09a1a19166ff42fe3f9705d17e8b001c562e2f4c4c3eb6e7b2a39f6f04e4629ddd9c7a70ff9bac017ac8ee7342533f9cfd65a220a9d166d04fdb44e0ddf956602b5189de0008312e5beb3f0a0a0b02530762f6f06749bb666254d932a3832d13fa6dd9e77d202094266e80cb2be5b59b6949b16056344cd96f35fb9ff1491e254dd81a6ffdda6d4cb8c3f6f8435024f63aea941ab1cb9d5a18eddd0852ab8af85a45aebbf318ad5118bf93b2e0927362cd3e1088f912d1b259cc78ba073c71e3476fab5ea1197eeefa88ab816b383dd836223a2d11273ecc19839c75e6c62187b08a022fbb5c537595393acd434eb2f0c1deeff25f30c02098b2bb73558294d47aa7d6d3dbc645629c39d74632723c3542d39a67c1323dc1b975efc3f590cf71447d89cbb8eb944ce41ae41fa27962ac97b255357ad0a237967ba79e921ef20b329993943a85b87ef4c80e7cf35d556fd127cd7d0aa347db3daa79c6aa0cb913d1b55e1cf75e68e679661b9b5a9a3339e5051e34d75aa537ef99a7c785bfb97bbab3b92629053cab34571c2a5d312c36a22af510f5f9eeafb393973053369dd8712bc33fc133eb30ec0e4214e65b4874032e6f4da509d4839670af748b13391addf6c3ec7d076550c04074cbf97331dca2b51c6b09403e6916cb6bb0348abc3193bdd82cab122f42d469906d5cc2849ff801f6c32f336011b3c9d2e18776c690c0fb59f80168848c76490ccac7b191861cfa80305aa07a633d2b836721a342acde6f2eb1c1acbcc152a45135a0c632d1d318355901b82d910996b9fcbbbfa1855a1b32c018a69ec6435da077df2f8498cdc41980c750615f8487c718deb9e76f1172b9346c5d918772337be851ba191f4201019a4bbe361b8a18c5207fbd2800d66f760dd0835c1ff0de1cfa1ab55ca6d16cd452f78fe58c767947fa13a3a147882c08f51927183a9af29da14b6599a54b781c2a797caa5d95b530f5a8037f42d1dd15dc6dc59e0ae2274bdb6a30ae92548f572a20c9d0c486bbd0660517a88fa4cd151a45668cf73d1dc3bf005980e71c27c899e8487c3830a161e318d7caeed5a6cde9dbcc8478d1577cb383fad993ced184530ae32aee48ef0303f739a4d8e5b8592149d99f64fbe8bcfe9f6f7b78df088c4fd8f078d654ef2a380bc24de36bd537e0a5652db2da34640d3b6eb073644a1d81f0d8c727890ed0f60a74040f3094a7f5571cb2fd996bde099b0aff2a32abea8a66aa1f5afd62077189112b6d8ccbccba75e00b2a266e2877a9e269bfb32b94e0ee82bae28b986caf091cc08f4075011ee8bffeea4484e63b477913727f559903a8610255e504b947adf4797b5a99851378d25323c3b1509b8fdb4d5447e011fd2712fd8d9499eec18b13bc69460da5703f6d65052ba2e62da7314e4aaa99de0b142416408ac44e26e59e31f212ef6799ddc379584672c6583e514bce1d34f472e3b0402af970cc07d6bd15b78a92cdf15a6033fb2ecdab0c772906479e022352617832b6306798e1895b910f36a735375208434d4fe55c770a806245f5529857240576e18cbd25fb7401ff817ece322efa85654d7085c998b7abfa1109c0d50295c17ff0292cc2ffacddb7dd89615dac27237b720f4ea7b837bbe30e75b214de72a38104c0e06ad4374b67c3daf5ebbd977d58fe403c004bde9db59e535a05c86f4a1f83621badb4f53ed834f5288a055149e8749960fd0af1b713cb7c5c33d0d1beeded3c98d1c058b7dc13c3bdfdf2708322fe5ba1840986d7ca8dd62a60ad0014e9eb8e739d09d14878d666a39ef7322c6ea1332865998c7f337d6a3f09d10678211f1d77686e6bbd941d9b2311524881bb3242354c3638855f7a36e1bcfebb2b34cab70f33b0142fb8ab04b31c68c8fe6f6fc3f416994b0a42bd370f411d7fde3073fea1c8654ec57f37fcc33c7413b87e48390960a9f65d95ce52f3114d022563be2c7399b0d26c84efd952e21edc35366bd8d62b625f185686e615a136aca009c0512986a37a859f4ed3ada2ca3390665b3924eda642f7cecc0df877dc866ea4d1fd11320acfd2ace632fb5f5ce51247a8ff302538cfe4690ad0dfa2e0af7094e5e6a0d2762c2d1490973906a9c0dce9145b65107ba2b2679f3f68aedc752b75be86c8509d2647670b02d739595d0eff3e6064bee472f4bae82c0fb73758348243b5ec70038e05ea9e16ff5282a3699be4d06e12f839a911ebfdbd204865461f5fcc30f6d759e4eea587ec61ec5c2030606dad2cdae1626a5344e2ce208cdf3efa34121afc377d0c559c9e991ee0f92686f6b50a06c69a938c7ce136202463d377c9050147670c05205120f46bbd4610927bd77010e9e8a412e1fca553971eeb66c361b7a4bdf0279d3e1b5d033effed49a5bd909123ecdb84a17bf4d6dfaa81e3086f2061a842794d8a30276251fbac1567c6b9e9a6b9f3a6a707fdf52e551270c5b23fc21677c1f27c3e8", &(0x7f0000001700)=""/65) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:36 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf2521000000440022800800030004000000080003000900000008000300794309283b8c60e656e42007000000080002000100000008000200010000000800020002000000050004000000000008000200020000000c0006000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x90}, 0x4000011) 22:27:36 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) r2 = request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) request_key(&(0x7f00000017c0)='id_legacy\x00', &(0x7f0000001800)={'syz', 0x1}, &(0x7f0000001940)='\x00', r2) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:36 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:36 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:36 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:37 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:37 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 22:27:37 executing program 0: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:37 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 5: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x5}], {0x14}}, 0x3c}}, 0x0) 22:27:37 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:37 executing program 3: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 5: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:37 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 4: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:37 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:37 executing program 5: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:37 executing program 3: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:38 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:38 executing program 5: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 3: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:38 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x74, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_EXPRESSIONS={0x58, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @void}}, {0x10, 0x1, 0x0, 0x1, @tunnel={{0xb}, @void}}, {0x10, 0x1, 0x0, 0x1, @dynset={{0xb}, @void}}, {0xc, 0x1, 0x0, 0x1, @log={{0x8}, @void}}, {0x10, 0x1, 0x0, 0x1, @lookup={{0xb}, @void}}]}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 3: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) 22:27:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x1c, 0x6, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}], {0x14}}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:38 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:38 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 0: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 1: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:38 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:38 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 5: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:38 executing program 1: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:38 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 1: request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:38 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:38 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:38 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba549", 0x1a, 0xffffffffffffffff) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0) 22:27:39 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e411", 0x2, 0xffffffffffffffff) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:39 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 1: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 4: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0xc000) pivot_root(&(0x7f0000001a00)='./file0\x00', 0x0) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @auto=[0x5f, 0x32, 0x64, 0x33, 0x65, 0x65, 0x34, 0x39, 0x63, 0x38, 0x38, 0x34, 0x32, 0x65, 0x39, 0x39]}, &(0x7f0000000600)={0x0, "f4c73b54ea03d4d315f8f3b80e3202d77368bb1a1c81b0da251f8a011b3d9436f7dfd4480a6e04ba6ff7b2c3b72848d8a041f8926636a242f0b7e8682c4d418d", 0x1f}, 0x48, r1) 22:27:39 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:39 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:39 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:39 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5", 0x19, 0xffffffffffffffff) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340), 0x0, 0xffffffffffffffff) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd73804", 0xd, 0xffffffffffffffff) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) 22:27:40 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fd", 0x7, 0xffffffffffffffff) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:40 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240), 0x4) socketpair(0x26, 0xa, 0x2, &(0x7f00000003c0)) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:40 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:40 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:40 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:40 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r1, r1) r2 = add_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f00000003c0)="58412b70df2c42a87b5ec86e3e411b017bfa49e922bb7c5581579486a1ba80e0a48d79710064e37f5eab8641c715", 0x2e, 0xffffffffffffffff) keyctl$reject(0x13, r2, 0x7, 0x400, r1) r3 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=')\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r1, 0x1, 0x3, r3) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x8080, 0x2) 22:27:41 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae4", 0x4, 0xffffffffffffffff) 22:27:41 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) [ 889.186210] encrypted_key: insufficient parameters specified 22:27:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x10000}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x7}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:41 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r1, r1) r2 = add_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f00000003c0)="58412b70df2c42a87b5ec86e3e411b017bfa49e922bb7c5581579486a1ba80e0a48d79710064e37f5eab8641c715", 0x2e, 0xffffffffffffffff) keyctl$reject(0x13, r2, 0x7, 0x400, r1) r3 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=')\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r1, 0x1, 0x3, r3) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x8080, 0x2) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 4: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)='\xfd-\x00', &(0x7f00000000c0)='^\xdf.-\xa8{\x00', &(0x7f0000000140)='%:\x00', &(0x7f0000000180)='/,%)^\\!\x00', &(0x7f00000001c0)='[]&\\,}\x00', &(0x7f0000000200)='/\x00', &(0x7f0000000240)='}(%\x00', &(0x7f0000000280)='}^[:\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\',[\x00'], &(0x7f0000000400)=[&(0x7f00000003c0)='\x00'], 0x100) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) [ 889.303137] encrypted_key: insufficient parameters specified 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 4: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) accept4(r1, 0x0, &(0x7f0000000140), 0x80800) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0xd, 0x5998976d) recvfrom(r2, &(0x7f0000000180)=""/83, 0x53, 0x40002162, &(0x7f0000000200)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x2}}, 0x80) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) accept4(r1, 0x0, &(0x7f0000000140), 0x80800) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0xd, 0x5998976d) recvfrom(r2, &(0x7f0000000180)=""/83, 0x53, 0x40002162, &(0x7f0000000200)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x2}}, 0x80) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:41 executing program 4: r0 = request_key(0x0, &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118a", 0x3, 0xffffffffffffffff) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) accept4(r1, 0x0, &(0x7f0000000140), 0x80800) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0xd, 0x5998976d) recvfrom(r2, &(0x7f0000000180)=""/83, 0x53, 0x40002162, &(0x7f0000000200)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x2}}, 0x80) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e411", 0x2, 0xffffffffffffffff) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) accept4(r1, 0x0, &(0x7f0000000140), 0x80800) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) socket$nl_netfilter(0x10, 0x3, 0xc) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) accept4(r1, 0x0, &(0x7f0000000140), 0x80800) socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:41 executing program 5: add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4", 0x1, 0xffffffffffffffff) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x0) socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:41 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) 22:27:41 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:41 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:41 executing program 2: socket$inet6(0xa, 0xd, 0x5998976d) 22:27:41 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: socket$inet6(0xa, 0x0, 0x5998976d) 22:27:42 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: socket$inet6(0xa, 0x0, 0x5998976d) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:42 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 2: socket$inet6(0xa, 0x0, 0x5998976d) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: socket$inet6(0xa, 0xd, 0x0) 22:27:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:42 executing program 1: add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x28, 0x15, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8}]}, 0x28}}, 0x0) 22:27:42 executing program 1: add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:42 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) socket$nl_netfilter(0x10, 0x3, 0xc) 22:27:42 executing program 1: add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x10000}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, r0) 22:27:42 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:42 executing program 1: add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) keyctl$reject(0x13, 0x0, 0x7, 0x400, r0) 22:27:42 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:42 executing program 4: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:42 executing program 1: add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r0) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) add_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="6aa744afa275af1231d774a378c72f65d52b93cd61e1a826aad5a0081168ad69e48bfaa55fe68eced77f637ba4ec981676baf95fdf9b7bc732a8d116dc3b2805b26a7a4c2faf5a960b73e516123dd61297a3c1976a41a3668c773d94af", 0x5d, r3) 22:27:42 executing program 1: add_key(&(0x7f00000002c0)='.dead\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:42 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000500), &(0x7f0000000540)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "9ed7668539770ebe805d71e3293da297116b07700c87c1b97ab5b9ffe7cc45ea3563c9c76509517e573269db36d1766b838303ef9f068f0afe51f6be6927ef16", 0x27}, 0x48, 0xfffffffffffffff8) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:42 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 2: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) add_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 22:27:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:42 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:42 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xf869, r2) 22:27:42 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x20008040) 22:27:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0x0) 22:27:42 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:43 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(0x0, 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x20008040) 22:27:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x20008040) 22:27:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f0000000680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 22:27:43 executing program 3: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:43 executing program 5: add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x3, 0x4) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x3, 0x4) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r7, 0xc018937d, 0x0) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)=0x3, 0x4) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', 0x0, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/partitions\x00', 0x0, 0x0) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) getuid() openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 3: socketpair(0xa, 0x6, 0x0, 0x0) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a", 0x2d}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 3: socketpair(0x0, 0x6, 0x0, 0x0) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xffffffffffffffff) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, 0x1, 0x4, 0x0, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getuid() openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 3: socketpair(0x0, 0x6, 0x0, 0x0) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xffffffffffffffff) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 3: socketpair(0x0, 0x6, 0x0, 0x0) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xffffffffffffffff) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:43 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:43 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:43 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "c2f8a7fedeffffc4bde2caf4721db30588cafb5825758fb70b87ab99f8daf6805f507d38f6424c1bbf01580ca640eeb12d80d50266588ee4cab6c2670fc8528a"}, 0x48, 0xffffffffffffffff) 22:27:43 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 3: socketpair(0xa, 0x0, 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51", 0x32, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 3: socketpair(0xa, 0x0, 0x0, 0x0) 22:27:44 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 1: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 1: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 3: socketpair(0xa, 0x0, 0x0, 0x0) 22:27:44 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 1: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b8748", 0x4b, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:44 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 1: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:44 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) getuid() openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:44 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1", 0x57, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:44 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x20008040) 22:27:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:44 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:44 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ff", 0x5d, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) 22:27:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}}, 0x0) 22:27:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) 22:27:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x2c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x10000}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20008040) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:44 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:44 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) 22:27:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:44 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) bind$unix(r6, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) [ 893.139295] Process accounting resumed 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r2 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) [ 893.230376] Process accounting resumed 22:27:45 executing program 5: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b", 0x60, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) [ 893.376219] Process accounting resumed 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b9572", 0x62, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise}]}}) 22:27:45 executing program 0: acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) [ 893.455301] Process accounting resumed 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 0: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:45 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:45 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:45 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:45 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:45 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:45 executing program 5: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:45 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, r1) 22:27:46 executing program 5: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:46 executing program 5: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:46 executing program 1: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='/proc/consoles\x00', 0x0) 22:27:46 executing program 1: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:46 executing program 1: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: r0 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='(}\x00', 0xfffffffffffffff8) keyctl$search(0xa, 0x0, &(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = add_key(&(0x7f00000002c0)='dns_resolver\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="e4118ae45d45fdcab22bd738048aebc0107e9ac66771b30ba5498e6314e8958423ca38c93b7b33ab4185078a99c380bedb51f3785b253a592c9e406b1357c463f727a6526c2c514f2b87486b07b77f0790e8fe648998f1f36334aec3ffaa9b5b95720b", 0x63, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000000280)='/proc/consoles\x00', r1) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:46 executing program 4: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:47 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:48 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:48 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:48 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:49 executing program 2: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:49 executing program 2: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:49 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:49 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.id\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, r3}}, {@uid_gt}, {@appraise}]}}) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}, {@euid_lt}]}}) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 3: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) 22:27:50 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8808, 0x1) socketpair(0x1e, 0x0, 0x0, 0x0) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 22:27:50 executing program 3: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) [ 898.734078] Process accounting resumed 22:27:50 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 1) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) 22:27:50 executing program 3: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) [ 898.782926] Process accounting resumed [ 898.785297] cgroup: cgroup2: unknown option "memory_recursiveprot" 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 22:27:50 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 22:27:50 executing program 1: acct(&(0x7f0000000040)='./file0\x00') [ 898.849356] FAULT_INJECTION: forcing a failure. [ 898.849356] name failslab, interval 1, probability 0, space 0, times 0 [ 898.867655] Process accounting resumed 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) [ 898.895206] CPU: 0 PID: 24788 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 898.903123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 898.906829] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 898.912474] Call Trace: [ 898.912494] dump_stack+0x1b2/0x281 [ 898.912510] should_fail.cold+0x10a/0x149 [ 898.912522] should_failslab+0xd6/0x130 [ 898.912534] __kmalloc_track_caller+0x2bc/0x400 [ 898.912542] ? strndup_user+0x5b/0xf0 [ 898.912553] memdup_user+0x22/0xa0 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r0, 0x0, 0x0) [ 898.945102] strndup_user+0x5b/0xf0 [ 898.948735] ? copy_mnt_ns+0xa30/0xa30 [ 898.952628] SyS_mount+0x39/0x120 [ 898.956082] ? copy_mnt_ns+0xa30/0xa30 [ 898.959005] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 898.959962] do_syscall_64+0x1d5/0x640 [ 898.959979] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.959987] RIP: 0033:0x7f1aa2cb25a9 [ 898.959991] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 898.960000] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) [ 898.960009] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 899.001457] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 899.007998] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 899.008721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.008728] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:50 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 2) 22:27:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:50 executing program 1: acct(&(0x7f0000000040)='./file0\x00') 22:27:50 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 22:27:50 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}]}}) 22:27:50 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) 22:27:51 executing program 1: acct(&(0x7f0000000040)='./file0\x00') 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:51 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 3: socketpair(0x22, 0x0, 0x0, 0x0) 22:27:51 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 899.113527] cgroup: cgroup2: unknown option "memory_recursiveprot" 22:27:51 executing program 1: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') [ 899.182703] FAULT_INJECTION: forcing a failure. [ 899.182703] name failslab, interval 1, probability 0, space 0, times 0 [ 899.183301] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 899.230529] CPU: 0 PID: 24831 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 899.238441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 899.247796] Call Trace: [ 899.250386] dump_stack+0x1b2/0x281 [ 899.254021] should_fail.cold+0x10a/0x149 [ 899.258178] should_failslab+0xd6/0x130 [ 899.262164] __kmalloc_track_caller+0x2bc/0x400 [ 899.266824] ? strndup_user+0x5b/0xf0 [ 899.270747] memdup_user+0x22/0xa0 [ 899.274267] strndup_user+0x5b/0xf0 [ 899.277873] ? copy_mnt_ns+0xa30/0xa30 [ 899.281736] SyS_mount+0x68/0x120 [ 899.285176] ? copy_mnt_ns+0xa30/0xa30 [ 899.289157] do_syscall_64+0x1d5/0x640 [ 899.293029] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.298198] RIP: 0033:0x7f1aa2cb25a9 [ 899.301885] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.309568] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 899.316815] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 22:27:51 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 3) 22:27:51 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:51 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 1: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:51 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 899.324065] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 899.331312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.338566] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:51 executing program 1: creat(0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') 22:27:51 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) [ 899.394866] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 899.397125] FAULT_INJECTION: forcing a failure. [ 899.397125] name failslab, interval 1, probability 0, space 0, times 0 [ 899.429731] CPU: 0 PID: 24854 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}]}}) 22:27:51 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 899.437650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 899.447006] Call Trace: [ 899.449592] dump_stack+0x1b2/0x281 [ 899.453229] should_fail.cold+0x10a/0x149 [ 899.457390] should_failslab+0xd6/0x130 [ 899.461374] kmem_cache_alloc_trace+0x29a/0x3d0 [ 899.466048] ? copy_mnt_ns+0xa30/0xa30 [ 899.469941] copy_mount_options+0x59/0x2f0 [ 899.474179] ? copy_mnt_ns+0xa30/0xa30 [ 899.478070] SyS_mount+0x84/0x120 [ 899.481623] ? copy_mnt_ns+0xa30/0xa30 [ 899.485511] do_syscall_64+0x1d5/0x640 [ 899.489402] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'user.incfs.id\x00'}}]}}) [ 899.494591] RIP: 0033:0x7f1aa2cb25a9 [ 899.498295] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.505999] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 899.513365] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 899.520636] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 899.527908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.535181] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:51 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 4) 22:27:51 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:51 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 1) 22:27:51 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:51 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 1) 22:27:51 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 899.610868] FAULT_INJECTION: forcing a failure. [ 899.610868] name failslab, interval 1, probability 0, space 0, times 0 [ 899.617791] FAULT_INJECTION: forcing a failure. [ 899.617791] name failslab, interval 1, probability 0, space 0, times 0 [ 899.647366] CPU: 0 PID: 24881 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 899.655277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 899.664626] Call Trace: [ 899.667204] dump_stack+0x1b2/0x281 [ 899.670821] should_fail.cold+0x10a/0x149 [ 899.674954] should_failslab+0xd6/0x130 [ 899.678922] __kmalloc_track_caller+0x2bc/0x400 [ 899.683581] ? strndup_user+0x5b/0xf0 [ 899.687371] memdup_user+0x22/0xa0 [ 899.690908] strndup_user+0x5b/0xf0 [ 899.694520] ? copy_mnt_ns+0xa30/0xa30 [ 899.698406] SyS_mount+0x39/0x120 [ 899.701845] ? copy_mnt_ns+0xa30/0xa30 [ 899.705717] do_syscall_64+0x1d5/0x640 [ 899.709596] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.714207] FAULT_INJECTION: forcing a failure. [ 899.714207] name failslab, interval 1, probability 0, space 0, times 0 [ 899.714778] RIP: 0033:0x7f0fe10fe5a9 [ 899.729659] RSP: 002b:00007f0fdfa71168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.737440] RAX: ffffffffffffffda RBX: 00007f0fe121ef80 RCX: 00007f0fe10fe5a9 [ 899.744701] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 899.751961] RBP: 00007f0fdfa711d0 R08: 0000000020000440 R09: 0000000000000000 [ 899.759219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.766473] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa71300 R15: 0000000000022000 [ 899.773747] CPU: 1 PID: 24882 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 899.781632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 899.790984] Call Trace: [ 899.793575] dump_stack+0x1b2/0x281 [ 899.797218] should_fail.cold+0x10a/0x149 [ 899.801371] should_failslab+0xd6/0x130 [ 899.805346] kmem_cache_alloc+0x28e/0x3c0 22:27:51 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(0x0) 22:27:51 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:51 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 899.809501] getname_flags+0xc8/0x550 [ 899.813311] user_path_at_empty+0x2a/0x50 [ 899.817465] do_mount+0x118/0x2a30 [ 899.821014] ? copy_mount_string+0x40/0x40 [ 899.825253] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 899.830274] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 899.835119] ? copy_mnt_ns+0xa30/0xa30 [ 899.839007] ? copy_mount_options+0x1fa/0x2f0 [ 899.843502] ? copy_mnt_ns+0xa30/0xa30 [ 899.847392] SyS_mount+0xa8/0x120 [ 899.850841] ? copy_mnt_ns+0xa30/0xa30 [ 899.854725] do_syscall_64+0x1d5/0x640 [ 899.858619] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.863808] RIP: 0033:0x7f1aa2cb25a9 [ 899.867507] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.875205] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 899.882468] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 899.889734] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 899.896993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 899.904245] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 899.911512] CPU: 0 PID: 24890 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 899.919395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 899.928729] Call Trace: [ 899.931301] dump_stack+0x1b2/0x281 [ 899.934911] should_fail.cold+0x10a/0x149 [ 899.939045] should_failslab+0xd6/0x130 [ 899.943005] __kmalloc_track_caller+0x2bc/0x400 [ 899.947652] ? strndup_user+0x5b/0xf0 [ 899.951437] memdup_user+0x22/0xa0 [ 899.954962] strndup_user+0x5b/0xf0 [ 899.958569] ? copy_mnt_ns+0xa30/0xa30 [ 899.962437] SyS_mount+0x39/0x120 [ 899.965876] ? copy_mnt_ns+0xa30/0xa30 [ 899.969753] do_syscall_64+0x1d5/0x640 [ 899.973630] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.978805] RIP: 0033:0x7fc5a09d55a9 [ 899.982496] RSP: 002b:00007fc59f327168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.990186] RAX: ffffffffffffffda RBX: 00007fc5a0af6050 RCX: 00007fc5a09d55a9 [ 899.997444] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 900.004711] RBP: 00007fc59f3271d0 R08: 0000000020000440 R09: 0000000000000000 22:27:51 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:51 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 2) 22:27:51 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') (fail_nth: 1) 22:27:51 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:51 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 5) [ 900.011969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.019310] R13: 00007ffeeb6bda4f R14: 00007fc59f327300 R15: 0000000000022000 22:27:51 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:52 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 900.112008] FAULT_INJECTION: forcing a failure. [ 900.112008] name failslab, interval 1, probability 0, space 0, times 0 [ 900.141596] FAULT_INJECTION: forcing a failure. [ 900.141596] name failslab, interval 1, probability 0, space 0, times 0 [ 900.155096] FAULT_INJECTION: forcing a failure. [ 900.155096] name failslab, interval 1, probability 0, space 0, times 0 [ 900.176082] CPU: 1 PID: 24909 Comm: syz-executor.1 Not tainted 4.14.295-syzkaller #0 [ 900.183990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.193351] Call Trace: [ 900.195950] dump_stack+0x1b2/0x281 [ 900.199589] should_fail.cold+0x10a/0x149 [ 900.203747] should_failslab+0xd6/0x130 [ 900.207729] kmem_cache_alloc+0x28e/0x3c0 [ 900.211888] getname_flags+0xc8/0x550 [ 900.215692] ? acct_pin_kill+0x100/0x100 [ 900.219758] SyS_acct+0x43/0x850 [ 900.223124] ? acct_pin_kill+0x100/0x100 [ 900.227187] do_syscall_64+0x1d5/0x640 [ 900.231087] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.236273] RIP: 0033:0x7f5a084395a9 [ 900.239978] RSP: 002b:00007f5a06dac168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 900.247708] RAX: ffffffffffffffda RBX: 00007f5a08559f80 RCX: 00007f5a084395a9 [ 900.254979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 900.262248] RBP: 00007f5a06dac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 900.269524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.276793] R13: 00007ffd27767edf R14: 00007f5a06dac300 R15: 0000000000022000 [ 900.284082] CPU: 0 PID: 24911 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 900.291973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.301320] Call Trace: [ 900.303899] dump_stack+0x1b2/0x281 [ 900.307513] should_fail.cold+0x10a/0x149 [ 900.311647] should_failslab+0xd6/0x130 [ 900.315604] kmem_cache_alloc+0x28e/0x3c0 [ 900.319744] alloc_vfsmnt+0x23/0x7f0 [ 900.323447] ? _raw_read_unlock+0x29/0x40 [ 900.327580] vfs_kern_mount.part.0+0x27/0x470 [ 900.332062] do_mount+0xe65/0x2a30 [ 900.335596] ? copy_mount_string+0x40/0x40 [ 900.339819] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 900.344819] ? copy_mnt_ns+0xa30/0xa30 [ 900.348689] ? copy_mount_options+0x1fa/0x2f0 [ 900.353168] ? copy_mnt_ns+0xa30/0xa30 [ 900.357041] SyS_mount+0xa8/0x120 [ 900.360485] ? copy_mnt_ns+0xa30/0xa30 [ 900.364362] do_syscall_64+0x1d5/0x640 [ 900.368236] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.373407] RIP: 0033:0x7f1aa2cb25a9 [ 900.377098] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 900.384806] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 900.392059] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 900.399316] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 900.406572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.413832] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 900.421132] CPU: 1 PID: 24912 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 900.429028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.438386] Call Trace: [ 900.440981] dump_stack+0x1b2/0x281 [ 900.444615] should_fail.cold+0x10a/0x149 [ 900.448765] should_failslab+0xd6/0x130 [ 900.452745] __kmalloc_track_caller+0x2bc/0x400 [ 900.457412] ? strndup_user+0x5b/0xf0 [ 900.461215] memdup_user+0x22/0xa0 [ 900.464759] strndup_user+0x5b/0xf0 [ 900.468383] ? copy_mnt_ns+0xa30/0xa30 [ 900.472274] SyS_mount+0x68/0x120 [ 900.475728] ? copy_mnt_ns+0xa30/0xa30 [ 900.479615] do_syscall_64+0x1d5/0x640 [ 900.483513] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.488700] RIP: 0033:0x7f0fe10fe5a9 [ 900.492410] RSP: 002b:00007f0fdfa71168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 900.500130] RAX: ffffffffffffffda RBX: 00007f0fe121ef80 RCX: 00007f0fe10fe5a9 22:27:52 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 2) 22:27:52 executing program 3: mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:52 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:52 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') (fail_nth: 2) 22:27:52 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 6) 22:27:52 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 3) [ 900.507398] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 900.514649] RBP: 00007f0fdfa711d0 R08: 0000000020000440 R09: 0000000000000000 [ 900.521904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.529161] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa71300 R15: 0000000000022000 22:27:52 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:52 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:52 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 900.597123] FAULT_INJECTION: forcing a failure. [ 900.597123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 900.607521] FAULT_INJECTION: forcing a failure. [ 900.607521] name failslab, interval 1, probability 0, space 0, times 0 [ 900.608944] CPU: 0 PID: 24933 Comm: syz-executor.1 Not tainted 4.14.295-syzkaller #0 [ 900.608951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.608956] Call Trace: [ 900.608972] dump_stack+0x1b2/0x281 22:27:52 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:52 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 900.608990] should_fail.cold+0x10a/0x149 [ 900.647746] __alloc_pages_nodemask+0x22c/0x2720 [ 900.650445] FAULT_INJECTION: forcing a failure. [ 900.650445] name failslab, interval 1, probability 0, space 0, times 0 [ 900.652505] ? __lock_acquire+0x5fc/0x3f20 [ 900.652529] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 900.652543] ? get_pid_task+0xb8/0x130 [ 900.676659] ? fsnotify+0x974/0x11b0 [ 900.680377] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 900.685309] ? finish_task_switch+0x14d/0x610 [ 900.689803] ? SyS_write+0x1b7/0x210 [ 900.693541] cache_grow_begin+0x91/0x700 22:27:52 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 900.697602] ? fs_reclaim_release+0xd0/0x110 [ 900.702014] ? check_preemption_disabled+0x35/0x240 [ 900.707037] cache_alloc_refill+0x273/0x350 [ 900.711364] kmem_cache_alloc+0x333/0x3c0 [ 900.715520] getname_flags+0xc8/0x550 [ 900.719497] ? acct_pin_kill+0x100/0x100 [ 900.723557] SyS_acct+0x43/0x850 [ 900.726912] ? acct_pin_kill+0x100/0x100 [ 900.730969] do_syscall_64+0x1d5/0x640 [ 900.734859] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.740045] RIP: 0033:0x7f5a084395a9 [ 900.743753] RSP: 002b:00007f5a06dac168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 900.751458] RAX: ffffffffffffffda RBX: 00007f5a08559f80 RCX: 00007f5a084395a9 [ 900.758721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 900.766003] RBP: 00007f5a06dac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 900.773267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.780524] R13: 00007ffd27767edf R14: 00007f5a06dac300 R15: 0000000000022000 [ 900.787857] CPU: 1 PID: 24934 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 900.795749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.805106] Call Trace: [ 900.807703] dump_stack+0x1b2/0x281 [ 900.811341] should_fail.cold+0x10a/0x149 [ 900.815492] should_failslab+0xd6/0x130 [ 900.819477] kmem_cache_alloc+0x28e/0x3c0 [ 900.823633] alloc_vfsmnt+0x23/0x7f0 [ 900.827350] ? _raw_read_unlock+0x29/0x40 [ 900.831503] vfs_kern_mount.part.0+0x27/0x470 [ 900.836011] do_mount+0xe65/0x2a30 [ 900.837146] FAULT_INJECTION: forcing a failure. [ 900.837146] name failslab, interval 1, probability 0, space 0, times 0 [ 900.839547] ? retint_kernel+0x2d/0x2d [ 900.839560] ? copy_mount_string+0x40/0x40 [ 900.839575] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 900.859429] Process accounting resumed [ 900.863672] ? copy_mount_options+0x1fa/0x2f0 [ 900.863681] ? copy_mnt_ns+0xa30/0xa30 [ 900.863690] SyS_mount+0xa8/0x120 [ 900.863698] ? copy_mnt_ns+0xa30/0xa30 [ 900.863711] do_syscall_64+0x1d5/0x640 [ 900.863727] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.863734] RIP: 0033:0x7f1aa2cb25a9 [ 900.863738] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 900.863747] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 900.863752] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 900.863759] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 900.925462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.932732] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 900.940009] CPU: 0 PID: 24942 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 900.947898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 900.957422] Call Trace: [ 900.960005] dump_stack+0x1b2/0x281 [ 900.963618] should_fail.cold+0x10a/0x149 [ 900.967751] should_failslab+0xd6/0x130 [ 900.971709] kmem_cache_alloc_trace+0x29a/0x3d0 [ 900.976359] ? copy_mnt_ns+0xa30/0xa30 [ 900.980228] copy_mount_options+0x59/0x2f0 [ 900.984447] ? copy_mnt_ns+0xa30/0xa30 [ 900.988317] SyS_mount+0x84/0x120 [ 900.991756] ? copy_mnt_ns+0xa30/0xa30 [ 900.995626] do_syscall_64+0x1d5/0x640 [ 900.999507] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.004676] RIP: 0033:0x7f0fe10fe5a9 [ 901.008366] RSP: 002b:00007f0fdfa50168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.016057] RAX: ffffffffffffffda RBX: 00007f0fe121f050 RCX: 00007f0fe10fe5a9 [ 901.023315] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 901.030579] RBP: 00007f0fdfa501d0 R08: 0000000020000440 R09: 0000000000000000 [ 901.037836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 901.045104] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa50300 R15: 0000000000022000 [ 901.060805] CPU: 0 PID: 24951 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 901.068723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.078080] Call Trace: [ 901.080672] dump_stack+0x1b2/0x281 [ 901.084306] should_fail.cold+0x10a/0x149 [ 901.088465] should_failslab+0xd6/0x130 [ 901.092453] __kmalloc_track_caller+0x2bc/0x400 [ 901.097125] ? strndup_user+0x5b/0xf0 [ 901.100930] memdup_user+0x22/0xa0 [ 901.104471] strndup_user+0x5b/0xf0 [ 901.108098] ? copy_mnt_ns+0xa30/0xa30 [ 901.111973] SyS_mount+0x68/0x120 [ 901.115403] ? copy_mnt_ns+0xa30/0xa30 [ 901.119279] do_syscall_64+0x1d5/0x640 [ 901.123151] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.128459] RIP: 0033:0x7fc5a09d55a9 [ 901.132150] RSP: 002b:00007fc59f327168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.139841] RAX: ffffffffffffffda RBX: 00007fc5a0af6050 RCX: 00007fc5a09d55a9 22:27:53 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 3) 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:53 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') (fail_nth: 3) 22:27:53 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 7) 22:27:53 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 4) [ 901.147095] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 901.154357] RBP: 00007fc59f3271d0 R08: 0000000020000440 R09: 0000000000000000 [ 901.161604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 901.168849] R13: 00007ffeeb6bda4f R14: 00007fc59f327300 R15: 0000000000022000 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 901.228935] FAULT_INJECTION: forcing a failure. [ 901.228935] name failslab, interval 1, probability 0, space 0, times 0 [ 901.238292] FAULT_INJECTION: forcing a failure. [ 901.238292] name failslab, interval 1, probability 0, space 0, times 0 [ 901.249462] CPU: 0 PID: 24963 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 901.259350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.267177] FAULT_INJECTION: forcing a failure. [ 901.267177] name failslab, interval 1, probability 0, space 0, times 0 [ 901.268695] Call Trace: [ 901.268712] dump_stack+0x1b2/0x281 [ 901.268728] should_fail.cold+0x10a/0x149 [ 901.268739] should_failslab+0xd6/0x130 [ 901.268750] kmem_cache_alloc_trace+0x29a/0x3d0 [ 901.268765] ? copy_mnt_ns+0xa30/0xa30 [ 901.302862] copy_mount_options+0x59/0x2f0 [ 901.307088] ? copy_mnt_ns+0xa30/0xa30 [ 901.310963] SyS_mount+0x84/0x120 [ 901.314400] ? copy_mnt_ns+0xa30/0xa30 [ 901.318274] do_syscall_64+0x1d5/0x640 [ 901.322153] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.327326] RIP: 0033:0x7fc5a09d55a9 [ 901.331031] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.338722] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 901.345975] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 901.353229] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 901.360483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 901.367740] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 901.375009] CPU: 1 PID: 24967 Comm: syz-executor.1 Not tainted 4.14.295-syzkaller #0 [ 901.381856] FAULT_INJECTION: forcing a failure. [ 901.381856] name failslab, interval 1, probability 0, space 0, times 0 [ 901.382892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.382896] Call Trace: [ 901.382910] dump_stack+0x1b2/0x281 [ 901.382927] should_fail.cold+0x10a/0x149 [ 901.413769] should_failslab+0xd6/0x130 [ 901.417749] kmem_cache_alloc_trace+0x29a/0x3d0 [ 901.422421] SyS_acct+0xab/0x850 [ 901.425789] ? acct_pin_kill+0x100/0x100 [ 901.429850] do_syscall_64+0x1d5/0x640 [ 901.433747] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.438930] RIP: 0033:0x7f5a084395a9 [ 901.442625] RSP: 002b:00007f5a06dac168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 901.450313] RAX: ffffffffffffffda RBX: 00007f5a08559f80 RCX: 00007f5a084395a9 [ 901.457565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 901.464817] RBP: 00007f5a06dac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 901.472069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@memory_recursiveprot}], [{@dont_measure}, {@audit}, {@measure}]}) [ 901.479325] R13: 00007ffd27767edf R14: 00007f5a06dac300 R15: 0000000000022000 [ 901.486593] CPU: 0 PID: 24965 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 901.494481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.503832] Call Trace: [ 901.506419] dump_stack+0x1b2/0x281 [ 901.510045] should_fail.cold+0x10a/0x149 [ 901.514191] should_failslab+0xd6/0x130 [ 901.518177] __kmalloc_track_caller+0x2bc/0x400 [ 901.522844] ? kstrdup_const+0x35/0x60 [ 901.526731] ? lock_downgrade+0x740/0x740 [ 901.530894] kstrdup+0x36/0x70 [ 901.534091] kstrdup_const+0x35/0x60 [ 901.537798] alloc_vfsmnt+0xe0/0x7f0 [ 901.541511] ? _raw_read_unlock+0x29/0x40 [ 901.545662] vfs_kern_mount.part.0+0x27/0x470 [ 901.550179] do_mount+0xe65/0x2a30 [ 901.553705] ? do_raw_spin_unlock+0x164/0x220 [ 901.558185] ? copy_mount_string+0x40/0x40 [ 901.562408] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 901.567410] ? copy_mnt_ns+0xa30/0xa30 [ 901.571283] ? copy_mount_options+0x1fa/0x2f0 [ 901.575760] ? copy_mnt_ns+0xa30/0xa30 [ 901.579630] SyS_mount+0xa8/0x120 [ 901.583075] ? copy_mnt_ns+0xa30/0xa30 [ 901.586969] do_syscall_64+0x1d5/0x640 [ 901.591106] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.596282] RIP: 0033:0x7f1aa2cb25a9 [ 901.599980] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.607670] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 901.614924] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 901.622176] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 901.629430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 901.636683] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 901.643951] CPU: 1 PID: 24966 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 901.651842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.661196] Call Trace: [ 901.663788] dump_stack+0x1b2/0x281 [ 901.667418] should_fail.cold+0x10a/0x149 [ 901.671571] should_failslab+0xd6/0x130 [ 901.675548] kmem_cache_alloc+0x28e/0x3c0 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 901.677620] cgroup: cgroup2: unknown option "memory_recursiveprot" [ 901.679694] getname_flags+0xc8/0x550 [ 901.679707] user_path_at_empty+0x2a/0x50 [ 901.679717] do_mount+0x118/0x2a30 [ 901.679732] ? copy_mount_string+0x40/0x40 [ 901.679743] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 901.679754] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 901.679764] ? copy_mnt_ns+0xa30/0xa30 [ 901.715438] ? copy_mount_options+0x1fa/0x2f0 [ 901.719936] ? copy_mnt_ns+0xa30/0xa30 [ 901.723828] SyS_mount+0xa8/0x120 [ 901.727279] ? copy_mnt_ns+0xa30/0xa30 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 901.731167] do_syscall_64+0x1d5/0x640 [ 901.735064] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.740252] RIP: 0033:0x7f0fe10fe5a9 [ 901.743960] RSP: 002b:00007f0fdfa71168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.751666] RAX: ffffffffffffffda RBX: 00007f0fe121ef80 RCX: 00007f0fe10fe5a9 [ 901.758931] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 901.766206] RBP: 00007f0fdfa711d0 R08: 0000000020000440 R09: 0000000000000000 [ 901.773472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 22:27:53 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 4) 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:53 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') (fail_nth: 4) 22:27:53 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 8) 22:27:53 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 5) [ 901.780740] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa71300 R15: 0000000000022000 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:53 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 901.863283] FAULT_INJECTION: forcing a failure. [ 901.863283] name failslab, interval 1, probability 0, space 0, times 0 [ 901.878197] FAULT_INJECTION: forcing a failure. [ 901.878197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 901.889050] FAULT_INJECTION: forcing a failure. [ 901.889050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 901.901814] CPU: 0 PID: 24998 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 901.909702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 901.919052] Call Trace: [ 901.921636] dump_stack+0x1b2/0x281 [ 901.925259] should_fail.cold+0x10a/0x149 [ 901.929410] __alloc_pages_nodemask+0x22c/0x2720 [ 901.934167] ? __save_stack_trace+0x63/0x160 [ 901.938575] ? is_bpf_text_address+0x91/0x150 [ 901.943064] ? __lock_acquire+0x5fc/0x3f20 [ 901.947295] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 901.952145] ? kernel_text_address+0xbd/0xf0 [ 901.956550] ? __kernel_text_address+0x9/0x30 [ 901.961042] ? depot_save_stack+0x10d/0x3f0 [ 901.965358] ? kasan_kmalloc+0x139/0x160 [ 901.969421] cache_grow_begin+0x91/0x700 [ 901.973474] ? fs_reclaim_release+0xd0/0x110 [ 901.977966] ? check_preemption_disabled+0x35/0x240 [ 901.983064] cache_alloc_refill+0x273/0x350 [ 901.987394] kmem_cache_alloc+0x333/0x3c0 [ 901.991552] getname_flags+0xc8/0x550 [ 901.995349] user_path_at_empty+0x2a/0x50 [ 901.999492] do_mount+0x118/0x2a30 [ 902.003033] ? copy_mount_string+0x40/0x40 [ 902.005074] cgroup: cgroup2: unknown option "dont_measure" [ 902.007264] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.007277] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 902.007286] ? copy_mnt_ns+0xa30/0xa30 [ 902.007295] ? copy_mount_options+0x1fa/0x2f0 [ 902.007305] ? copy_mnt_ns+0xa30/0xa30 [ 902.034948] SyS_mount+0xa8/0x120 [ 902.038386] ? copy_mnt_ns+0xa30/0xa30 [ 902.042268] do_syscall_64+0x1d5/0x640 [ 902.046160] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.051345] RIP: 0033:0x7f0fe10fe5a9 [ 902.055037] RSP: 002b:00007f0fdfa71168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[], [{@dont_measure}, {@audit}, {@measure}]}) 22:27:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[], [{@dont_measure}, {@audit}]}) [ 902.062732] RAX: ffffffffffffffda RBX: 00007f0fe121ef80 RCX: 00007f0fe10fe5a9 [ 902.069994] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 902.077263] RBP: 00007f0fdfa711d0 R08: 0000000020000440 R09: 0000000000000000 [ 902.083845] cgroup: cgroup2: unknown option "dont_measure" [ 902.084527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.097407] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa71300 R15: 0000000000022000 [ 902.104677] CPU: 1 PID: 24994 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 902.112558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 902.121911] Call Trace: [ 902.124501] dump_stack+0x1b2/0x281 [ 902.128137] should_fail.cold+0x10a/0x149 [ 902.132294] __alloc_pages_nodemask+0x22c/0x2720 [ 902.137056] ? trace_hardirqs_on+0x10/0x10 [ 902.141296] ? _find_next_bit+0xdb/0x100 [ 902.145359] ? pcpu_alloc+0xbe0/0xf50 [ 902.149171] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 902.154018] ? fill_board_specific_data+0x439/0x782 [ 902.159042] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 902.164498] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.169524] alloc_pages_current+0x155/0x260 [ 902.173930] ? __lockdep_init_map+0x100/0x560 [ 902.178427] get_zeroed_page+0x19/0x50 [ 902.182316] mount_fs+0x1c7/0x2a0 [ 902.185775] vfs_kern_mount.part.0+0x5b/0x470 [ 902.190275] do_mount+0xe65/0x2a30 [ 902.193815] ? cx231xx_417_register.cold+0x71/0xd8 [ 902.198745] ? copy_mount_string+0x40/0x40 [ 902.202983] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.208003] ? copy_mnt_ns+0xa30/0xa30 22:27:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) [ 902.211897] ? copy_mount_options+0x1fa/0x2f0 [ 902.212573] FAULT_INJECTION: forcing a failure. [ 902.212573] name failslab, interval 1, probability 0, space 0, times 0 [ 902.216390] ? copy_mnt_ns+0xa30/0xa30 [ 902.231447] SyS_mount+0xa8/0x120 [ 902.234900] ? copy_mnt_ns+0xa30/0xa30 [ 902.238787] do_syscall_64+0x1d5/0x640 [ 902.242686] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.247871] RIP: 0033:0x7f1aa2cb25a9 [ 902.251569] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.259269] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 902.266520] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 902.273780] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 902.281053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.288317] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 902.299637] CPU: 1 PID: 24993 Comm: syz-executor.1 Not tainted 4.14.295-syzkaller #0 [ 902.307525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 902.316876] Call Trace: [ 902.319461] dump_stack+0x1b2/0x281 [ 902.323087] should_fail.cold+0x10a/0x149 [ 902.327232] should_failslab+0xd6/0x130 [ 902.331208] kmem_cache_alloc+0x28e/0x3c0 [ 902.335365] get_empty_filp+0x86/0x3f0 [ 902.339248] path_openat+0x84/0x2970 [ 902.342964] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.348329] ? __save_stack_trace+0xa0/0x160 [ 902.352741] ? depot_save_stack+0x10d/0x3f0 [ 902.357070] ? path_lookupat+0x780/0x780 [ 902.361130] ? kasan_kmalloc+0x139/0x160 [ 902.365186] ? kasan_kmalloc+0xeb/0x160 [ 902.369146] ? kmem_cache_alloc_trace+0x131/0x3d0 [ 902.373974] ? SyS_acct+0xab/0x850 [ 902.377496] ? do_syscall_64+0x1d5/0x640 [ 902.381538] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.386889] do_filp_open+0x179/0x3c0 [ 902.390681] ? may_open_dev+0xe0/0xe0 [ 902.394471] ? trace_hardirqs_on+0x10/0x10 [ 902.398689] ? SyS_acct+0x65/0x850 [ 902.402213] ? SyS_acct+0x65/0x850 [ 902.405735] ? __mutex_lock+0x360/0x1310 [ 902.409786] ? SyS_acct+0x65/0x850 [ 902.413316] ? fs_reclaim_release+0xd0/0x110 [ 902.417708] file_open_name+0x1d2/0x280 [ 902.421664] ? filp_clone_open+0xf0/0xf0 [ 902.425706] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 902.431145] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.436149] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 902.440979] SyS_acct+0xcb/0x850 [ 902.444329] ? acct_pin_kill+0x100/0x100 [ 902.448372] do_syscall_64+0x1d5/0x640 [ 902.452253] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.457434] RIP: 0033:0x7f5a084395a9 [ 902.461139] RSP: 002b:00007f5a06dac168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 902.468837] RAX: ffffffffffffffda RBX: 00007f5a08559f80 RCX: 00007f5a084395a9 [ 902.476110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 902.483361] RBP: 00007f5a06dac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.490619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.497876] R13: 00007ffd27767edf R14: 00007f5a06dac300 R15: 0000000000022000 [ 902.505146] CPU: 0 PID: 24999 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 902.513037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 902.522390] Call Trace: [ 902.524982] dump_stack+0x1b2/0x281 [ 902.528618] should_fail.cold+0x10a/0x149 [ 902.532771] should_failslab+0xd6/0x130 [ 902.536752] kmem_cache_alloc+0x28e/0x3c0 [ 902.540908] getname_flags+0xc8/0x550 [ 902.544717] user_path_at_empty+0x2a/0x50 [ 902.548863] do_mount+0x118/0x2a30 [ 902.552416] ? copy_mount_string+0x40/0x40 [ 902.556657] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.561674] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 902.566510] ? copy_mnt_ns+0xa30/0xa30 [ 902.570380] ? copy_mount_options+0x1fa/0x2f0 [ 902.574855] ? copy_mnt_ns+0xa30/0xa30 [ 902.578724] SyS_mount+0xa8/0x120 [ 902.582156] ? copy_mnt_ns+0xa30/0xa30 [ 902.586020] do_syscall_64+0x1d5/0x640 [ 902.589901] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.595067] RIP: 0033:0x7fc5a09d55a9 [ 902.598758] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.606442] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 22:27:54 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 5) 22:27:54 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 6) 22:27:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[], [{@dont_measure}]}) 22:27:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:54 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 9) 22:27:54 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') (fail_nth: 5) [ 902.613691] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 902.620938] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 902.628183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.635430] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 902.694712] cgroup: cgroup2: unknown option "dont_measure" [ 902.701407] FAULT_INJECTION: forcing a failure. [ 902.701407] name failslab, interval 1, probability 0, space 0, times 0 [ 902.703559] FAULT_INJECTION: forcing a failure. [ 902.703559] name failslab, interval 1, probability 0, space 0, times 0 [ 902.717323] FAULT_INJECTION: forcing a failure. [ 902.717323] name failslab, interval 1, probability 0, space 0, times 0 [ 902.728373] FAULT_INJECTION: forcing a failure. 22:27:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 902.728373] name failslab, interval 1, probability 0, space 0, times 0 [ 902.744549] CPU: 1 PID: 25026 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 902.754575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 902.763925] Call Trace: [ 902.766518] dump_stack+0x1b2/0x281 [ 902.770151] should_fail.cold+0x10a/0x149 [ 902.774295] should_failslab+0xd6/0x130 [ 902.778257] kmem_cache_alloc_trace+0x29a/0x3d0 [ 902.782915] ? set_bdev_super+0x110/0x110 [ 902.787043] sget_userns+0x102/0xc10 [ 902.790748] ? set_bdev_super+0x110/0x110 [ 902.794884] ? ns_test_super+0x50/0x50 [ 902.798759] ? set_bdev_super+0x110/0x110 [ 902.802897] ? ns_test_super+0x50/0x50 [ 902.806767] sget+0xd1/0x110 [ 902.809775] mount_bdev+0xcd/0x360 [ 902.813304] ? fuse_get_root_inode+0xc0/0xc0 [ 902.817705] mount_fs+0x92/0x2a0 [ 902.821081] vfs_kern_mount.part.0+0x5b/0x470 [ 902.825582] do_mount+0xe65/0x2a30 [ 902.829118] ? copy_mount_string+0x40/0x40 [ 902.833346] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.838347] ? copy_mnt_ns+0xa30/0xa30 [ 902.842230] ? copy_mount_options+0x1fa/0x2f0 [ 902.846719] ? copy_mnt_ns+0xa30/0xa30 [ 902.850591] SyS_mount+0xa8/0x120 [ 902.854036] ? copy_mnt_ns+0xa30/0xa30 [ 902.857918] do_syscall_64+0x1d5/0x640 [ 902.861801] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.866977] RIP: 0033:0x7f1aa2cb25a9 [ 902.870673] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.878366] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 902.885626] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 22:27:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 902.892893] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 902.900156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.907425] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 902.925977] CPU: 0 PID: 25027 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 902.933888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 902.943241] Call Trace: [ 902.945890] dump_stack+0x1b2/0x281 [ 902.949527] should_fail.cold+0x10a/0x149 [ 902.953681] should_failslab+0xd6/0x130 [ 902.957662] kmem_cache_alloc+0x28e/0x3c0 [ 902.961816] alloc_vfsmnt+0x23/0x7f0 [ 902.965531] ? _raw_read_unlock+0x29/0x40 [ 902.969679] vfs_kern_mount.part.0+0x27/0x470 [ 902.974174] do_mount+0xe65/0x2a30 [ 902.977725] ? copy_mount_string+0x40/0x40 [ 902.981964] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 902.986984] ? copy_mnt_ns+0xa30/0xa30 [ 902.990875] ? copy_mount_options+0x1fa/0x2f0 22:27:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) 22:27:54 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 10) [ 902.995372] ? copy_mnt_ns+0xa30/0xa30 [ 902.999280] SyS_mount+0xa8/0x120 [ 903.002832] ? copy_mnt_ns+0xa30/0xa30 [ 903.006813] do_syscall_64+0x1d5/0x640 [ 903.008983] FAULT_INJECTION: forcing a failure. [ 903.008983] name failslab, interval 1, probability 0, space 0, times 0 [ 903.010709] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.010719] RIP: 0033:0x7fc5a09d55a9 [ 903.010723] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.010732] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 903.010737] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 903.010742] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 903.010747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.010753] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 903.012778] CPU: 0 PID: 25025 Comm: syz-executor.0 Not tainted 4.14.295-syzkaller #0 [ 903.082791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 903.092145] Call Trace: [ 903.094748] dump_stack+0x1b2/0x281 [ 903.098375] should_fail.cold+0x10a/0x149 [ 903.102519] should_failslab+0xd6/0x130 [ 903.106486] __kmalloc_track_caller+0x2bc/0x400 [ 903.111142] ? kstrdup_const+0x35/0x60 [ 903.115010] ? lock_downgrade+0x740/0x740 [ 903.119148] kstrdup+0x36/0x70 [ 903.122333] kstrdup_const+0x35/0x60 [ 903.126034] alloc_vfsmnt+0xe0/0x7f0 [ 903.129734] ? _raw_read_unlock+0x29/0x40 [ 903.133865] vfs_kern_mount.part.0+0x27/0x470 [ 903.138346] do_mount+0xe65/0x2a30 [ 903.141878] ? copy_mount_string+0x40/0x40 [ 903.146105] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.151117] ? copy_mnt_ns+0xa30/0xa30 [ 903.155013] ? copy_mount_options+0x1fa/0x2f0 [ 903.159493] ? copy_mnt_ns+0xa30/0xa30 [ 903.163369] SyS_mount+0xa8/0x120 [ 903.166806] ? copy_mnt_ns+0xa30/0xa30 [ 903.170679] do_syscall_64+0x1d5/0x640 [ 903.174552] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.179732] RIP: 0033:0x7f0fe10fe5a9 [ 903.183430] RSP: 002b:00007f0fdfa71168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:27:54 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) [ 903.191120] RAX: ffffffffffffffda RBX: 00007f0fe121ef80 RCX: 00007f0fe10fe5a9 [ 903.198375] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 903.205631] RBP: 00007f0fdfa711d0 R08: 0000000020000440 R09: 0000000000000000 [ 903.212892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.220148] R13: 00007ffe1a5e1d5f R14: 00007f0fdfa71300 R15: 0000000000022000 [ 903.227418] CPU: 1 PID: 25040 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 903.235306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 903.244645] Call Trace: [ 903.247223] dump_stack+0x1b2/0x281 [ 903.250835] should_fail.cold+0x10a/0x149 [ 903.254968] should_failslab+0xd6/0x130 [ 903.258928] kmem_cache_alloc+0x28e/0x3c0 [ 903.263063] getname_kernel+0x4e/0x340 [ 903.266933] kern_path+0x1b/0x40 [ 903.270283] lookup_bdev+0xc6/0x1c0 [ 903.273895] ? bd_acquire+0x440/0x440 [ 903.277681] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 903.283116] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.288118] blkdev_get_by_path+0x1b/0xa0 [ 903.292252] mount_bdev+0x4c/0x360 [ 903.295775] ? fuse_get_root_inode+0xc0/0xc0 [ 903.300163] mount_fs+0x92/0x2a0 [ 903.303518] vfs_kern_mount.part.0+0x5b/0x470 [ 903.308000] do_mount+0xe65/0x2a30 [ 903.311525] ? do_raw_spin_unlock+0x164/0x220 [ 903.316007] ? copy_mount_string+0x40/0x40 [ 903.320243] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.325241] ? copy_mnt_ns+0xa30/0xa30 [ 903.329114] ? copy_mount_options+0x1fa/0x2f0 [ 903.333593] ? copy_mnt_ns+0xa30/0xa30 [ 903.337465] SyS_mount+0xa8/0x120 [ 903.340905] ? copy_mnt_ns+0xa30/0xa30 [ 903.344776] do_syscall_64+0x1d5/0x640 [ 903.348654] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.353835] RIP: 0033:0x7f1aa2cb25a9 [ 903.357547] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.365254] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 903.372517] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 903.379779] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 903.387067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 903.394329] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 [ 903.401610] CPU: 0 PID: 25028 Comm: syz-executor.1 Not tainted 4.14.295-syzkaller #0 [ 903.409499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 903.418853] Call Trace: [ 903.421443] dump_stack+0x1b2/0x281 [ 903.425075] should_fail.cold+0x10a/0x149 [ 903.429230] should_failslab+0xd6/0x130 [ 903.433208] kmem_cache_alloc_trace+0x29a/0x3d0 [ 903.437887] apparmor_file_alloc_security+0x129/0x800 [ 903.443096] security_file_alloc+0x66/0xa0 [ 903.447347] ? selinux_is_enabled+0x5/0x50 [ 903.451627] get_empty_filp+0x16b/0x3f0 [ 903.455610] path_openat+0x84/0x2970 [ 903.459322] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.464691] ? __save_stack_trace+0xa0/0x160 [ 903.469113] ? depot_save_stack+0x10d/0x3f0 [ 903.473438] ? path_lookupat+0x780/0x780 [ 903.477505] ? kasan_kmalloc+0x139/0x160 [ 903.481569] ? kasan_kmalloc+0xeb/0x160 [ 903.482873] FAULT_INJECTION: forcing a failure. [ 903.482873] name failslab, interval 1, probability 0, space 0, times 0 [ 903.485540] ? kmem_cache_alloc_trace+0x131/0x3d0 [ 903.485550] ? SyS_acct+0xab/0x850 [ 903.485560] ? do_syscall_64+0x1d5/0x640 [ 903.485570] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.485587] do_filp_open+0x179/0x3c0 [ 903.518279] ? may_open_dev+0xe0/0xe0 [ 903.522077] ? trace_hardirqs_on+0x10/0x10 [ 903.526301] ? SyS_acct+0x65/0x850 [ 903.529837] ? SyS_acct+0x65/0x850 [ 903.533374] ? __mutex_lock+0x360/0x1310 [ 903.537425] ? SyS_acct+0x65/0x850 [ 903.540948] ? fs_reclaim_release+0xd0/0x110 [ 903.545346] file_open_name+0x1d2/0x280 [ 903.549303] ? filp_clone_open+0xf0/0xf0 [ 903.553351] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 903.558791] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.563794] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 903.568625] SyS_acct+0xcb/0x850 [ 903.571983] ? acct_pin_kill+0x100/0x100 [ 903.576028] do_syscall_64+0x1d5/0x640 [ 903.579905] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.585079] RIP: 0033:0x7f5a084395a9 [ 903.588775] RSP: 002b:00007f5a06dac168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 22:27:55 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 6) [ 903.596467] RAX: ffffffffffffffda RBX: 00007f5a08559f80 RCX: 00007f5a084395a9 [ 903.603722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 903.610980] RBP: 00007f5a06dac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.618234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.625486] R13: 00007ffd27767edf R14: 00007f5a06dac300 R15: 0000000000022000 [ 903.632753] CPU: 1 PID: 25049 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 903.640642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 903.649990] Call Trace: [ 903.652583] dump_stack+0x1b2/0x281 [ 903.656217] should_fail.cold+0x10a/0x149 [ 903.660367] should_failslab+0xd6/0x130 [ 903.664333] kmem_cache_alloc+0x28e/0x3c0 [ 903.668461] alloc_vfsmnt+0x23/0x7f0 [ 903.672155] ? _raw_read_unlock+0x29/0x40 [ 903.676285] vfs_kern_mount.part.0+0x27/0x470 [ 903.680767] do_mount+0xe65/0x2a30 [ 903.684294] ? do_raw_spin_unlock+0x164/0x220 [ 903.688768] ? copy_mount_string+0x40/0x40 [ 903.692986] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.697983] ? copy_mnt_ns+0xa30/0xa30 [ 903.701863] ? copy_mount_options+0x1fa/0x2f0 [ 903.706347] ? copy_mnt_ns+0xa30/0xa30 [ 903.710225] SyS_mount+0xa8/0x120 [ 903.713664] ? copy_mnt_ns+0xa30/0xa30 [ 903.717536] do_syscall_64+0x1d5/0x640 [ 903.721418] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 903.726596] RIP: 0033:0x7fc5a09d55a9 [ 903.730293] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.737991] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 22:27:55 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1cc) acct(&(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x1000, 0x4) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb420007e35f67e557c4fb895961e5af473ef7658bd9c1c04ad36f8fb5655e7b3797acb93461f301e10c19be33557742d3be96cb6c35c415cb2df140c41034373d3cd133cfb5713f"], 0x42, 0x2) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x2, 0x103) 22:27:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="72616973655f747970e53d690500"/32]) 22:27:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:55 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:55 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 11) 22:27:55 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 7) [ 903.745240] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 903.752488] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 903.759744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.767001] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 22:27:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:55 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1cc) acct(&(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x1000, 0x4) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb420007e35f67e557c4fb895961e5af473ef7658bd9c1c04ad36f8fb5655e7b3797acb93461f301e10c19be33557742d3be96cb6c35c415cb2df140c41034373d3cd133cfb5713f"], 0x42, 0x2) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x2, 0x103) creat(&(0x7f0000000000)='./file0\x00', 0x1cc) (async) acct(&(0x7f0000000040)='./file0\x00') (async) mknod(&(0x7f0000000080)='./file0\x00', 0x1000, 0x4) (async) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb420007e35f67e557c4fb895961e5af473ef7658bd9c1c04ad36f8fb5655e7b3797acb93461f301e10c19be33557742d3be96cb6c35c415cb2df140c41034373d3cd133cfb5713f"], 0x42, 0x2) (async) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x2, 0x103) (async) [ 903.837473] Process accounting resumed [ 903.846817] overlayfs: unrecognized mount option "raise_typå=i" or missing value [ 903.859580] FAULT_INJECTION: forcing a failure. [ 903.859580] name failslab, interval 1, probability 0, space 0, times 0 [ 903.865390] FAULT_INJECTION: forcing a failure. [ 903.865390] name failslab, interval 1, probability 0, space 0, times 0 [ 903.880206] CPU: 0 PID: 25063 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 903.889926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 903.899278] Call Trace: [ 903.901878] dump_stack+0x1b2/0x281 [ 903.905516] should_fail.cold+0x10a/0x149 [ 903.909671] should_failslab+0xd6/0x130 [ 903.913648] __kmalloc_track_caller+0x2bc/0x400 [ 903.918312] ? kstrdup_const+0x35/0x60 [ 903.922184] ? lock_downgrade+0x740/0x740 [ 903.926323] kstrdup+0x36/0x70 [ 903.929506] kstrdup_const+0x35/0x60 [ 903.933201] alloc_vfsmnt+0xe0/0x7f0 [ 903.936898] ? _raw_read_unlock+0x29/0x40 [ 903.941031] vfs_kern_mount.part.0+0x27/0x470 [ 903.945512] do_mount+0xe65/0x2a30 [ 903.949046] ? copy_mount_string+0x40/0x40 [ 903.953266] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 903.958272] ? copy_mnt_ns+0xa30/0xa30 [ 903.962149] ? copy_mount_options+0x1fa/0x2f0 [ 903.966631] ? copy_mnt_ns+0xa30/0xa30 [ 903.970625] SyS_mount+0xa8/0x120 [ 903.974077] ? copy_mnt_ns+0xa30/0xa30 [ 903.977960] do_syscall_64+0x1d5/0x640 [ 903.981841] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:27:55 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="72616973655f747970e53d690500"/32]) [ 903.987012] RIP: 0033:0x7fc5a09d55a9 [ 903.990707] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.998399] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 904.005654] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 904.012917] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 904.020172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.027424] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 904.034711] CPU: 1 PID: 25061 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 904.042706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 904.052059] Call Trace: [ 904.054652] dump_stack+0x1b2/0x281 [ 904.058303] should_fail.cold+0x10a/0x149 [ 904.062465] should_failslab+0xd6/0x130 [ 904.066010] Process accounting resumed [ 904.066526] kmem_cache_alloc_trace+0x29a/0x3d0 [ 904.066539] ? set_bdev_super+0x110/0x110 [ 904.079392] sget_userns+0x102/0xc10 [ 904.082956] Process accounting resumed 22:27:55 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="72616973655f747970e53d690500"/32]) creat(&(0x7f0000000100)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (async) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="72616973655f747970e53d690500"/32]) (async) [ 904.083107] ? set_bdev_super+0x110/0x110 [ 904.083119] ? ns_test_super+0x50/0x50 [ 904.095019] ? set_bdev_super+0x110/0x110 [ 904.099186] ? ns_test_super+0x50/0x50 [ 904.103068] sget+0xd1/0x110 [ 904.106108] mount_bdev+0xcd/0x360 [ 904.109651] ? fuse_get_root_inode+0xc0/0xc0 [ 904.114062] mount_fs+0x92/0x2a0 [ 904.117429] vfs_kern_mount.part.0+0x5b/0x470 [ 904.121932] do_mount+0xe65/0x2a30 [ 904.125496] ? do_raw_spin_unlock+0x164/0x220 [ 904.130000] ? copy_mount_string+0x40/0x40 22:27:56 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.134251] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 904.139276] ? copy_mnt_ns+0xa30/0xa30 [ 904.143179] ? copy_mount_options+0x1fa/0x2f0 [ 904.147679] ? copy_mnt_ns+0xa30/0xa30 [ 904.151570] SyS_mount+0xa8/0x120 [ 904.155020] ? copy_mnt_ns+0xa30/0xa30 [ 904.158907] do_syscall_64+0x1d5/0x640 [ 904.162819] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 904.168179] RIP: 0033:0x7f1aa2cb25a9 [ 904.171896] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.179619] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 22:27:56 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1cc) (async) acct(&(0x7f0000000040)='./file0\x00') (async) mknod(&(0x7f0000000080)='./file0\x00', 0x1000, 0x4) (async, rerun: 32) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb420007e35f67e557c4fb895961e5af473ef7658bd9c1c04ad36f8fb5655e7b3797acb93461f301e10c19be33557742d3be96cb6c35c415cb2df140c41034373d3cd133cfb5713f"], 0x42, 0x2) (rerun: 32) mknodat$null(r0, &(0x7f0000000140)='./file0\x00', 0x2, 0x103) 22:27:56 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 8) 22:27:56 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.186888] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 904.189385] overlayfs: unrecognized mount option "raise_typå=i" or missing value [ 904.194155] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 904.194160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 904.194164] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:56 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}]}}) 22:27:56 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 12) 22:27:56 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.239185] overlayfs: unrecognized mount option "raise_typå=i" or missing value [ 904.316930] FAULT_INJECTION: forcing a failure. [ 904.316930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 904.334388] FAULT_INJECTION: forcing a failure. [ 904.334388] name failslab, interval 1, probability 0, space 0, times 0 [ 904.336324] CPU: 1 PID: 25101 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 904.353678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 904.363032] Call Trace: [ 904.365613] dump_stack+0x1b2/0x281 [ 904.369316] should_fail.cold+0x10a/0x149 [ 904.373459] __alloc_pages_nodemask+0x22c/0x2720 [ 904.378210] ? trace_hardirqs_on+0x10/0x10 [ 904.382447] ? pcpu_alloc+0xbe0/0xf50 [ 904.386257] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 904.391123] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 904.396583] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 904.401607] alloc_pages_current+0x155/0x260 [ 904.406016] ? __lockdep_init_map+0x100/0x560 [ 904.410509] get_zeroed_page+0x19/0x50 [ 904.414388] mount_fs+0x1c7/0x2a0 [ 904.417829] vfs_kern_mount.part.0+0x5b/0x470 [ 904.422309] do_mount+0xe65/0x2a30 [ 904.425834] ? check_preemption_disabled+0x35/0x240 [ 904.430837] ? retint_kernel+0x2d/0x2d [ 904.434714] ? copy_mount_string+0x40/0x40 [ 904.438933] ? copy_mount_options+0x185/0x2f0 [ 904.443424] ? copy_mount_options+0x197/0x2f0 [ 904.447918] ? copy_mount_options+0x1fa/0x2f0 [ 904.452410] ? copy_mnt_ns+0xa30/0xa30 [ 904.456287] SyS_mount+0xa8/0x120 [ 904.459729] ? copy_mnt_ns+0xa30/0xa30 [ 904.463600] do_syscall_64+0x1d5/0x640 [ 904.467478] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 904.472656] RIP: 0033:0x7fc5a09d55a9 [ 904.476357] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.484224] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 904.491484] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 904.498743] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 904.505999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 22:27:56 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 22:27:56 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.513267] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 904.520564] CPU: 0 PID: 25102 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 904.528463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 904.537820] Call Trace: [ 904.540411] dump_stack+0x1b2/0x281 [ 904.544044] should_fail.cold+0x10a/0x149 [ 904.548197] should_failslab+0xd6/0x130 [ 904.552177] __kmalloc+0x2c1/0x400 [ 904.555731] ? __list_lru_init+0x67/0x710 [ 904.559891] __list_lru_init+0x67/0x710 [ 904.563874] sget_userns+0x4e4/0xc10 22:27:56 executing program 4: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:56 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.567606] ? set_bdev_super+0x110/0x110 [ 904.571761] ? ns_test_super+0x50/0x50 [ 904.575654] ? set_bdev_super+0x110/0x110 [ 904.579807] ? ns_test_super+0x50/0x50 [ 904.583695] sget+0xd1/0x110 [ 904.586716] mount_bdev+0xcd/0x360 [ 904.590258] ? fuse_get_root_inode+0xc0/0xc0 [ 904.594679] mount_fs+0x92/0x2a0 [ 904.598062] vfs_kern_mount.part.0+0x5b/0x470 [ 904.602563] do_mount+0xe65/0x2a30 [ 904.606119] ? copy_mount_string+0x40/0x40 [ 904.610360] ? rcu_read_lock_sched_held+0x16c/0x1d0 22:27:56 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.615383] ? copy_mnt_ns+0xa30/0xa30 [ 904.619276] ? copy_mount_options+0x1fa/0x2f0 [ 904.623772] ? copy_mnt_ns+0xa30/0xa30 [ 904.627664] SyS_mount+0xa8/0x120 [ 904.631119] ? copy_mnt_ns+0xa30/0xa30 [ 904.635013] do_syscall_64+0x1d5/0x640 [ 904.638913] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 904.644103] RIP: 0033:0x7f1aa2cb25a9 [ 904.647840] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.655550] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 22:27:56 executing program 4: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)) [ 904.662820] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 904.670093] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 904.677369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 904.684640] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:56 executing program 1: socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') r3 = socket$inet6(0xa, 0xa, 0x3) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 22:27:56 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 9) 22:27:56 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 22:27:56 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 22:27:56 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 13) 22:27:56 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:57 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) [ 905.114339] FAULT_INJECTION: forcing a failure. [ 905.114339] name failslab, interval 1, probability 0, space 0, times 0 [ 905.149249] FAULT_INJECTION: forcing a failure. [ 905.149249] name failslab, interval 1, probability 0, space 0, times 0 [ 905.175264] CPU: 0 PID: 25137 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 905.183173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 905.192528] Call Trace: [ 905.195119] dump_stack+0x1b2/0x281 [ 905.198762] should_fail.cold+0x10a/0x149 [ 905.202916] should_failslab+0xd6/0x130 [ 905.206893] kmem_cache_alloc+0x28e/0x3c0 [ 905.211043] getname_kernel+0x4e/0x340 [ 905.214933] kern_path+0x1b/0x40 [ 905.218290] lookup_bdev+0xc6/0x1c0 [ 905.221912] ? bd_acquire+0x440/0x440 [ 905.225705] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 905.231156] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.236168] blkdev_get_by_path+0x1b/0xa0 [ 905.240299] mount_bdev+0x4c/0x360 [ 905.243821] ? fuse_get_root_inode+0xc0/0xc0 [ 905.248213] mount_fs+0x92/0x2a0 [ 905.251568] vfs_kern_mount.part.0+0x5b/0x470 [ 905.256051] do_mount+0xe65/0x2a30 [ 905.259588] ? copy_mount_string+0x40/0x40 [ 905.263812] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.268816] ? copy_mnt_ns+0xa30/0xa30 [ 905.272688] ? copy_mount_options+0x1fa/0x2f0 [ 905.277167] ? copy_mnt_ns+0xa30/0xa30 [ 905.281039] SyS_mount+0xa8/0x120 [ 905.284478] ? copy_mnt_ns+0xa30/0xa30 [ 905.288348] do_syscall_64+0x1d5/0x640 [ 905.292224] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 905.297399] RIP: 0033:0x7fc5a09d55a9 [ 905.301092] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 905.308788] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 905.316065] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 905.323317] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 905.330569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 905.337821] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 905.345096] CPU: 1 PID: 25139 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 905.352990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 905.362345] Call Trace: [ 905.364933] dump_stack+0x1b2/0x281 [ 905.368570] should_fail.cold+0x10a/0x149 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) 22:27:57 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 905.372725] should_failslab+0xd6/0x130 [ 905.376702] __kmalloc+0x2c1/0x400 [ 905.380247] ? __list_lru_init+0x67/0x710 [ 905.384403] __list_lru_init+0x67/0x710 [ 905.388381] sget_userns+0x4e4/0xc10 [ 905.392096] ? set_bdev_super+0x110/0x110 [ 905.396252] ? ns_test_super+0x50/0x50 [ 905.400147] ? set_bdev_super+0x110/0x110 [ 905.404303] ? ns_test_super+0x50/0x50 [ 905.408194] sget+0xd1/0x110 [ 905.411214] mount_bdev+0xcd/0x360 [ 905.414757] ? fuse_get_root_inode+0xc0/0xc0 [ 905.419169] mount_fs+0x92/0x2a0 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) [ 905.422545] vfs_kern_mount.part.0+0x5b/0x470 [ 905.427055] do_mount+0xe65/0x2a30 [ 905.430595] ? do_raw_spin_unlock+0x164/0x220 [ 905.435098] ? copy_mount_string+0x40/0x40 [ 905.436197] Process accounting resumed [ 905.439333] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.439373] ? copy_mnt_ns+0xa30/0xa30 [ 905.439383] ? copy_mount_options+0x1fa/0x2f0 [ 905.439392] ? copy_mnt_ns+0xa30/0xa30 [ 905.439401] SyS_mount+0xa8/0x120 [ 905.439408] ? copy_mnt_ns+0xa30/0xa30 [ 905.439419] do_syscall_64+0x1d5/0x640 [ 905.471712] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:27:57 executing program 1: socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') (async) r3 = socket$inet6(0xa, 0xa, 0x3) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) (async) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) (async) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 22:27:57 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 10) 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) [ 905.476900] RIP: 0033:0x7f1aa2cb25a9 [ 905.480607] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 905.488310] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 905.495578] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 905.502853] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 905.510125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 905.517398] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:57 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 14) 22:27:57 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '+}'}, {0x20, 'fuseblk\x00'}, {0x20, '/dev/loop0\x00'}, {0x20, '.!&::^@}'}, {}, {0x20, '\\:'}], 0xa, "41b513c00c836852177aa187a51def084cba15953905734958413fe7a3b733e0326947001dd4e3c5195a94c7a611b8ca4e9f15d0f6f687f3f5124f85f3c6e3bd185bf122c7f08d9a4d73bd6036d155a5698fbda6a1a169b4cf6a5ca668e528a5aa13ff53269230ad8e094f115b9b6d23a97f1618cfad71c187eca35d26b60173537d821586dd14dbc88f2822addaca9b44e36f69253a58b5195d5e48ef61fb278a9d6e3ca60d43054bfaa582956b1e443c33d662cdb9a59442"}, 0xe9) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f706561643d30303030303010393030302c626c6b73697a653d3078303030303030303030303030303030302c646566736c6d1b5f7065726d697373696f6e732c7365636c6162656c2c0000000000000000"]) [ 905.605205] FAULT_INJECTION: forcing a failure. [ 905.605205] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 905.617033] CPU: 1 PID: 25182 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 905.624913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 905.634267] Call Trace: [ 905.636857] dump_stack+0x1b2/0x281 [ 905.640495] should_fail.cold+0x10a/0x149 [ 905.644644] ? get_page_from_freelist+0xaf6/0x25a0 [ 905.649575] __alloc_pages_nodemask+0x22c/0x2720 22:27:57 executing program 3: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 905.654337] ? lock_downgrade+0x740/0x740 [ 905.659015] ? page_outside_zone_boundaries+0x1db/0x310 [ 905.664385] ? __lock_acquire+0x5fc/0x3f20 [ 905.668628] ? preempt_count_add+0xaf/0x170 [ 905.672952] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 905.677883] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 905.683336] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.688355] ? __alloc_pages_nodemask+0x1a6e/0x2720 [ 905.693371] cache_grow_begin+0x91/0x700 [ 905.697431] ? fs_reclaim_release+0xd0/0x110 [ 905.701840] ? check_preemption_disabled+0x35/0x240 [ 905.706858] cache_alloc_refill+0x273/0x350 [ 905.711196] kmem_cache_alloc+0x333/0x3c0 [ 905.715346] getname_kernel+0x4e/0x340 [ 905.719236] kern_path+0x1b/0x40 [ 905.722604] lookup_bdev+0xc6/0x1c0 [ 905.726237] ? bd_acquire+0x440/0x440 [ 905.730042] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 905.731385] FAULT_INJECTION: forcing a failure. [ 905.731385] name failslab, interval 1, probability 0, space 0, times 0 [ 905.735501] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.751691] blkdev_get_by_path+0x1b/0xa0 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 905.755843] mount_bdev+0x4c/0x360 [ 905.759397] ? fuse_get_root_inode+0xc0/0xc0 [ 905.763828] mount_fs+0x92/0x2a0 [ 905.767202] vfs_kern_mount.part.0+0x5b/0x470 [ 905.771698] do_mount+0xe65/0x2a30 [ 905.775249] ? copy_mount_string+0x40/0x40 [ 905.779486] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.784504] ? copy_mnt_ns+0xa30/0xa30 [ 905.788388] ? copy_mount_options+0x1fa/0x2f0 [ 905.792879] ? copy_mnt_ns+0xa30/0xa30 [ 905.796769] SyS_mount+0xa8/0x120 [ 905.800219] ? copy_mnt_ns+0xa30/0xa30 [ 905.804105] do_syscall_64+0x1d5/0x640 [ 905.807995] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 905.813173] RIP: 0033:0x7fc5a09d55a9 [ 905.816873] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 905.824581] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 905.831849] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 905.839122] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 905.846389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '+}'}, {0x20, 'fuseblk\x00'}, {0x20, '/dev/loop0\x00'}, {0x20, '.!&::^@}'}, {}, {0x20, '\\:'}], 0xa, "41b513c00c836852177aa187a51def084cba15953905734958413fe7a3b733e0326947001dd4e3c5195a94c7a611b8ca4e9f15d0f6f687f3f5124f85f3c6e3bd185bf122c7f08d9a4d73bd6036d155a5698fbda6a1a169b4cf6a5ca668e528a5aa13ff53269230ad8e094f115b9b6d23a97f1618cfad71c187eca35d26b60173537d821586dd14dbc88f2822addaca9b44e36f69253a58b5195d5e48ef61fb278a9d6e3ca60d43054bfaa582956b1e443c33d662cdb9a59442"}, 0xe9) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f706561643d30303030303010393030302c626c6b73697a653d3078303030303030303030303030303030302c646566736c6d1b5f7065726d697373696f6e732c7365636c6162656c2c0000000000000000"]) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) (async) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '+}'}, {0x20, 'fuseblk\x00'}, {0x20, '/dev/loop0\x00'}, {0x20, '.!&::^@}'}, {}, {0x20, '\\:'}], 0xa, "41b513c00c836852177aa187a51def084cba15953905734958413fe7a3b733e0326947001dd4e3c5195a94c7a611b8ca4e9f15d0f6f687f3f5124f85f3c6e3bd185bf122c7f08d9a4d73bd6036d155a5698fbda6a1a169b4cf6a5ca668e528a5aa13ff53269230ad8e094f115b9b6d23a97f1618cfad71c187eca35d26b60173537d821586dd14dbc88f2822addaca9b44e36f69253a58b5195d5e48ef61fb278a9d6e3ca60d43054bfaa582956b1e443c33d662cdb9a59442"}, 0xe9) (async) creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f706561643d30303030303010393030302c626c6b73697a653d3078303030303030303030303030303030302c646566736c6d1b5f7065726d697373696f6e732c7365636c6162656c2c0000000000000000"]) (async) [ 905.853657] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 905.874095] CPU: 0 PID: 25185 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 905.882098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 905.891467] Call Trace: [ 905.894066] dump_stack+0x1b2/0x281 [ 905.897701] should_fail.cold+0x10a/0x149 [ 905.901857] should_failslab+0xd6/0x130 [ 905.905851] __kmalloc+0x2c1/0x400 [ 905.909395] ? __list_lru_init+0x67/0x710 [ 905.913552] __list_lru_init+0x67/0x710 [ 905.917531] sget_userns+0x4e4/0xc10 [ 905.921244] ? set_bdev_super+0x110/0x110 [ 905.925387] ? ns_test_super+0x50/0x50 [ 905.929256] ? set_bdev_super+0x110/0x110 [ 905.933381] ? ns_test_super+0x50/0x50 [ 905.937245] sget+0xd1/0x110 [ 905.940243] mount_bdev+0xcd/0x360 [ 905.943775] ? fuse_get_root_inode+0xc0/0xc0 [ 905.948169] mount_fs+0x92/0x2a0 [ 905.951523] vfs_kern_mount.part.0+0x5b/0x470 [ 905.955997] do_mount+0xe65/0x2a30 [ 905.959517] ? do_raw_spin_unlock+0x164/0x220 [ 905.963995] ? copy_mount_string+0x40/0x40 [ 905.968212] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 905.973209] ? copy_mnt_ns+0xa30/0xa30 [ 905.977077] ? copy_mount_options+0x1fa/0x2f0 [ 905.981549] ? copy_mnt_ns+0xa30/0xa30 [ 905.985418] SyS_mount+0xa8/0x120 [ 905.988852] ? copy_mnt_ns+0xa30/0xa30 [ 905.992719] do_syscall_64+0x1d5/0x640 [ 905.996590] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 906.001759] RIP: 0033:0x7f1aa2cb25a9 [ 906.005451] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 906.013136] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 906.020615] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 906.027873] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 906.035131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.042380] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:57 executing program 1: socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') r3 = socket$inet6(0xa, 0xa, 0x3) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)) (async) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) (async) creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) acct(&(0x7f0000000040)='./file0\x00') (async) lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) (async) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') (async) socket$inet6(0xa, 0xa, 0x3) (async) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) (async) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) (async) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) (async) 22:27:57 executing program 3: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 11) 22:27:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:57 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 15) 22:27:57 executing program 0: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '+}'}, {0x20, 'fuseblk\x00'}, {0x20, '/dev/loop0\x00'}, {0x20, '.!&::^@}'}, {}, {0x20, '\\:'}], 0xa, "41b513c00c836852177aa187a51def084cba15953905734958413fe7a3b733e0326947001dd4e3c5195a94c7a611b8ca4e9f15d0f6f687f3f5124f85f3c6e3bd185bf122c7f08d9a4d73bd6036d155a5698fbda6a1a169b4cf6a5ca668e528a5aa13ff53269230ad8e094f115b9b6d23a97f1618cfad71c187eca35d26b60173537d821586dd14dbc88f2822addaca9b44e36f69253a58b5195d5e48ef61fb278a9d6e3ca60d43054bfaa582956b1e443c33d662cdb9a59442"}, 0xe9) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f706561643d30303030303010393030302c626c6b73697a653d3078303030303030303030303030303030302c646566736c6d1b5f7065726d697373696f6e732c7365636c6162656c2c0000000000000000"]) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) (async) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '+}'}, {0x20, 'fuseblk\x00'}, {0x20, '/dev/loop0\x00'}, {0x20, '.!&::^@}'}, {}, {0x20, '\\:'}], 0xa, "41b513c00c836852177aa187a51def084cba15953905734958413fe7a3b733e0326947001dd4e3c5195a94c7a611b8ca4e9f15d0f6f687f3f5124f85f3c6e3bd185bf122c7f08d9a4d73bd6036d155a5698fbda6a1a169b4cf6a5ca668e528a5aa13ff53269230ad8e094f115b9b6d23a97f1618cfad71c187eca35d26b60173537d821586dd14dbc88f2822addaca9b44e36f69253a58b5195d5e48ef61fb278a9d6e3ca60d43054bfaa582956b1e443c33d662cdb9a59442"}, 0xe9) (async) creat(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f706561643d30303030303010393030302c626c6b73697a653d3078303030303030303030303030303030302c646566736c6d1b5f7065726d697373696f6e732c7365636c6162656c2c0000000000000000"]) (async) [ 906.077550] Process accounting resumed [ 906.132371] FAULT_INJECTION: forcing a failure. [ 906.132371] name failslab, interval 1, probability 0, space 0, times 0 [ 906.153825] CPU: 0 PID: 25221 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 906.161758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 906.171121] Call Trace: [ 906.173715] dump_stack+0x1b2/0x281 [ 906.177352] should_fail.cold+0x10a/0x149 [ 906.181521] should_failslab+0xd6/0x130 [ 906.185513] kmem_cache_alloc_trace+0x29a/0x3d0 [ 906.190189] ? set_bdev_super+0x110/0x110 [ 906.194344] sget_userns+0x102/0xc10 [ 906.195339] Process accounting resumed [ 906.198050] ? set_bdev_super+0x110/0x110 [ 906.198062] ? ns_test_super+0x50/0x50 [ 906.198072] ? set_bdev_super+0x110/0x110 [ 906.214092] ? ns_test_super+0x50/0x50 [ 906.217973] sget+0xd1/0x110 [ 906.220976] mount_bdev+0xcd/0x360 [ 906.224507] ? fuse_get_root_inode+0xc0/0xc0 [ 906.228893] mount_fs+0x92/0x2a0 [ 906.232237] vfs_kern_mount.part.0+0x5b/0x470 [ 906.236720] do_mount+0xe65/0x2a30 [ 906.240243] ? copy_mount_string+0x40/0x40 [ 906.244455] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 906.249456] ? copy_mnt_ns+0xa30/0xa30 [ 906.253329] ? copy_mount_options+0x1fa/0x2f0 [ 906.257803] ? copy_mnt_ns+0xa30/0xa30 [ 906.261667] SyS_mount+0xa8/0x120 [ 906.265100] ? copy_mnt_ns+0xa30/0xa30 [ 906.268975] do_syscall_64+0x1d5/0x640 [ 906.272849] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 906.278021] RIP: 0033:0x7fc5a09d55a9 22:27:58 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0)) 22:27:58 executing program 3: mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) mount$cgroup(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x5000, &(0x7f00000003c0)={[{}, {@none}, {@release_agent}, {@subsystem='devices'}, {@none}, {@xattr}, {@cpuset_v2_mode}], [{@context={'context', 0x3d, 'system_u'}}]}) acct(&(0x7f0000000040)='./file0\x00') sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000f00)={&(0x7f0000000e40), 0xc, &(0x7f0000000ec0)={0x0}}, 0x40841) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x2, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x841}, 0x20008800) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee00) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0/file0\x00'}) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0xd, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20060000}, 0x20000040) [ 906.281710] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 906.289395] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 906.296641] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 906.303891] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 906.311138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.318387] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 906.332465] FAULT_INJECTION: forcing a failure. [ 906.332465] name failslab, interval 1, probability 0, space 0, times 0 [ 906.344291] CPU: 0 PID: 25223 Comm: syz-executor.5 Not tainted 4.14.295-syzkaller #0 [ 906.352180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 906.361530] Call Trace: [ 906.364121] dump_stack+0x1b2/0x281 [ 906.367758] should_fail.cold+0x10a/0x149 [ 906.371911] should_failslab+0xd6/0x130 [ 906.375894] __kmalloc+0x2c1/0x400 [ 906.379442] ? match_number+0x9d/0x200 [ 906.383338] match_number+0x9d/0x200 [ 906.387050] ? match_strdup+0xa0/0xa0 [ 906.390856] fuse_fill_super+0x437/0x15c0 [ 906.395010] ? fuse_get_root_inode+0xc0/0xc0 [ 906.399425] ? lock_downgrade+0x740/0x740 [ 906.403583] ? set_blocksize+0x125/0x380 [ 906.407648] mount_bdev+0x2b3/0x360 [ 906.411278] ? fuse_get_root_inode+0xc0/0xc0 [ 906.415709] mount_fs+0x92/0x2a0 [ 906.419083] vfs_kern_mount.part.0+0x5b/0x470 [ 906.423584] do_mount+0xe65/0x2a30 [ 906.427126] ? tc_dump_tfilter+0xd30/0xd70 [ 906.431366] ? copy_mount_string+0x40/0x40 [ 906.435603] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 906.440624] ? copy_mnt_ns+0xa30/0xa30 [ 906.444520] ? copy_mount_options+0x1fa/0x2f0 [ 906.449019] ? copy_mnt_ns+0xa30/0xa30 [ 906.452910] SyS_mount+0xa8/0x120 [ 906.456366] ? copy_mnt_ns+0xa30/0xa30 [ 906.460258] do_syscall_64+0x1d5/0x640 [ 906.464155] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 906.469037] Process accounting resumed [ 906.469334] RIP: 0033:0x7f1aa2cb25a9 22:27:58 executing program 4: socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') r3 = socket$inet6(0xa, 0xa, 0x3) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 22:27:58 executing program 3: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) (async) mount$cgroup(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x5000, &(0x7f00000003c0)={[{}, {@none}, {@release_agent}, {@subsystem='devices'}, {@none}, {@xattr}, {@cpuset_v2_mode}], [{@context={'context', 0x3d, 'system_u'}}]}) (async, rerun: 64) acct(&(0x7f0000000040)='./file0\x00') (async, rerun: 64) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000f00)={&(0x7f0000000e40), 0xc, &(0x7f0000000ec0)={0x0}}, 0x40841) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x2, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x841}, 0x20008800) (async) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) (async) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee00) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) (async) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0/file0\x00'}) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0xd, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20060000}, 0x20000040) 22:27:58 executing program 3: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (fail_nth: 12) [ 906.469343] RSP: 002b:00007f1aa1625168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 906.469353] RAX: ffffffffffffffda RBX: 00007f1aa2dd2f80 RCX: 00007f1aa2cb25a9 [ 906.469361] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 906.499144] RBP: 00007f1aa16251d0 R08: 0000000020000440 R09: 0000000000000000 [ 906.506415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.513687] R13: 00007ffe7f3a536f R14: 00007f1aa1625300 R15: 0000000000022000 22:27:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) mount$cgroup(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x5000, &(0x7f00000003c0)={[{}, {@none}, {@release_agent}, {@subsystem='devices'}, {@none}, {@xattr}, {@cpuset_v2_mode}], [{@context={'context', 0x3d, 'system_u'}}]}) acct(&(0x7f0000000040)='./file0\x00') sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000f00)={&(0x7f0000000e40), 0xc, &(0x7f0000000ec0)={0x0}}, 0x40841) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x2, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x841}, 0x20008800) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee00) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0/file0\x00'}) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0xd, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20060000}, 0x20000040) creat(&(0x7f0000000000)='./file0\x00', 0x100) (async) mount$cgroup(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x5000, &(0x7f00000003c0)={[{}, {@none}, {@release_agent}, {@subsystem='devices'}, {@none}, {@xattr}, {@cpuset_v2_mode}], [{@context={'context', 0x3d, 'system_u'}}]}) (async) acct(&(0x7f0000000040)='./file0\x00') (async) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000f00)={&(0x7f0000000e40), 0xc, &(0x7f0000000ec0)={0x0}}, 0x40841) (async) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x2, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x841}, 0x20008800) (async) bind$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) (async) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0xee00) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0/file0\x00'}) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0/file0\x00'}) (async) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x38, 0xd, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20060000}, 0x20000040) (async) 22:27:58 executing program 3: creat(0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) (fail_nth: 16) 22:27:58 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@blksize}, {@default_permissions}], [{@seclabel}]}}) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x24800, &(0x7f0000000100)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x6}}], [{@dont_measure}, {@hash}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) [ 906.544018] Process accounting resumed [ 906.563302] Process accounting resumed [ 906.574836] FAULT_INJECTION: forcing a failure. [ 906.574836] name failslab, interval 1, probability 0, space 0, times 0 [ 906.615059] CPU: 0 PID: 25270 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 906.622974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 906.632329] Call Trace: [ 906.634922] dump_stack+0x1b2/0x281 [ 906.638560] should_fail.cold+0x10a/0x149 [ 906.642717] should_failslab+0xd6/0x130 [ 906.646699] __kmalloc+0x2c1/0x400 [ 906.650239] ? register_shrinker+0x1ab/0x220 [ 906.654653] register_shrinker+0x1ab/0x220 [ 906.655721] Process accounting resumed [ 906.658882] sget_userns+0x9aa/0xc10 [ 906.658897] ? set_bdev_super+0x110/0x110 [ 906.658908] ? ns_test_super+0x50/0x50 [ 906.658918] ? set_bdev_super+0x110/0x110 [ 906.676480] Process accounting resumed [ 906.678654] ? ns_test_super+0x50/0x50 [ 906.678664] sget+0xd1/0x110 [ 906.678676] mount_bdev+0xcd/0x360 [ 906.692960] ? fuse_get_root_inode+0xc0/0xc0 [ 906.697372] mount_fs+0x92/0x2a0 [ 906.700748] vfs_kern_mount.part.0+0x5b/0x470 [ 906.705247] do_mount+0xe65/0x2a30 [ 906.708831] ? copy_mount_string+0x40/0x40 22:27:58 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) uselib(&(0x7f0000000100)='./file0\x00') socketpair(0x27, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x3bf5}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r3, {0x6}}, './file1\x00'}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000280)={0x2}) acct(&(0x7f0000000040)='./file0\x00') socketpair(0xa, 0x5, 0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000380), &(0x7f0000000140)=0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r5, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x8}}, './file1\x00'}) r7 = accept(r6, &(0x7f0000000200)=@ethernet={0x0, @broadcast}, &(0x7f0000000340)=0x80) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1000050, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cache_mmap}], [{@measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '_[[#\\./!O\xa6\xd4U\xe8\xfdX\x06\xf9hC!\xa2\xa1\xcc\xaa\xe7\x15\xb3\xa9{\xf4p`K\x96\xcb\x88\xe6.a(\xd5\xc67\xf1=2\x86+\x18\xb3\xa6\x90\x8cP\xf3\xd0\xd2\x95\xeb\xc9\x1bF(\x1f\xb2D\xcf\x13\x9a\x8c\xff\x0f\x9dZT\x7f\xc2\x1e\x10\xf9\x84\x92\x9b/\x01\xe8:t\x1b\x96\xa7\xa1\xeb\xd6\x92\x00\xec\xafL\x80[\xd5\x8c\xb2U\xcc\x18\xbc\xe01\xa6\xf3\xdeBs?\xb8\xe8\xe9\xf4#|\x02e\x93G\x06\xa5qk\x7f\x0f\xa3!\x01\t\xdeYS\xdc\x054\xd7\x1eN\xe8h\xb2\xc2*F~\xf4\xabi\xcf)\x8c/jm@S\xce\x94\xc2\x7fp\xa6_\x03\x01|.8\xff\x18U\xe5\xfb\x8c\xd2'}}, {@dont_measure}, {@dont_measure}]}}) 22:27:58 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) [ 906.713071] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 906.718174] ? copy_mnt_ns+0xa30/0xa30 [ 906.722065] ? copy_mount_options+0x1fa/0x2f0 [ 906.726562] ? copy_mnt_ns+0xa30/0xa30 [ 906.730459] SyS_mount+0xa8/0x120 [ 906.733912] ? copy_mnt_ns+0xa30/0xa30 [ 906.737800] do_syscall_64+0x1d5/0x640 [ 906.741707] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 906.746899] RIP: 0033:0x7fc5a09d55a9 [ 906.748213] 9pnet: Insufficient options for proto=fd [ 906.750604] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 906.750616] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 906.750622] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 906.750628] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 906.750633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 906.750638] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 906.770028] ------------[ cut here ]------------ [ 906.804892] WARNING: CPU: 0 PID: 25270 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 906.812774] Kernel panic - not syncing: panic_on_warn set ... [ 906.812774] [ 906.814951] Process accounting resumed [ 906.820133] CPU: 0 PID: 25270 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0 [ 906.820139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 906.820143] Call Trace: [ 906.820160] dump_stack+0x1b2/0x281 [ 906.820172] panic+0x1f9/0x42d [ 906.820181] ? add_taint.cold+0x16/0x16 [ 906.820196] ? kill_block_super+0xbe/0xe0 [ 906.858761] ? __warn.cold+0x5/0x44 [ 906.862398] ? kill_block_super+0xbe/0xe0 [ 906.866550] __warn.cold+0x20/0x44 [ 906.870091] ? ist_end_non_atomic+0x10/0x10 [ 906.874413] ? kill_block_super+0xbe/0xe0 [ 906.878563] report_bug+0x208/0x250 [ 906.882204] do_error_trap+0x195/0x2d0 [ 906.886098] ? math_error+0x2d0/0x2d0 [ 906.889901] ? retint_kernel+0x2d/0x2d [ 906.890873] 9pnet: Insufficient options for proto=fd [ 906.893788] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 906.893804] invalid_op+0x1b/0x40 [ 906.893817] RIP: 0010:kill_block_super+0xbe/0xe0 [ 906.911912] RSP: 0018:ffff88808d62fbc8 EFLAGS: 00010246 [ 906.917277] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90006804000 [ 906.921244] Process accounting resumed [ 906.924537] RDX: 0000000000040000 RSI: ffffffff8187637e RDI: ffff8880902ded70 [ 906.924543] RBP: ffff888090f38440 R08: ffffffff8b9ab300 R09: 0000000000000001 [ 906.924549] R10: 0000000000000000 R11: ffff8880aa776540 R12: ffff8880902de8c0 [ 906.924555] R13: ffffffff891ea510 R14: ffffffff88f45820 R15: dffffc0000000000 [ 906.924579] ? kill_block_super+0xbe/0xe0 [ 906.924590] ? kill_block_super+0xbe/0xe0 22:27:58 executing program 4: socketpair(0x18, 0x40003, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x80000001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, @in={0x2, 0x4e21, @multicast2}], 0x2c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f0000000040)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "1a62847ec73b0473a18f7fa370a8ee99"}, 0x11, 0x1) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') r3 = socket$inet6(0xa, 0xa, 0x3) ioctl$BTRFS_IOC_WAIT_SYNC(r3, 0x40089416, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x8}}, '.\x00'}) renameat(r5, &(0x7f0000000300)='./file0/file0\x00', r4, &(0x7f0000000340)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$NFT_MSG_GETOBJ_RESET(r4, 0x0, 0x0) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 22:27:58 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 22:27:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 64) uselib(&(0x7f0000000100)='./file0\x00') (async, rerun: 64) socketpair(0x27, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x3bf5}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r3, {0x6}}, './file1\x00'}) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000280)={0x2}) (async) acct(&(0x7f0000000040)='./file0\x00') (async) socketpair(0xa, 0x5, 0x8, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000380), &(0x7f0000000140)=0x4) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r5, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x8}}, './file1\x00'}) r7 = accept(r6, &(0x7f0000000200)=@ethernet={0x0, @broadcast}, &(0x7f0000000340)=0x80) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1000050, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@cache_mmap}], [{@measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '_[[#\\./!O\xa6\xd4U\xe8\xfdX\x06\xf9hC!\xa2\xa1\xcc\xaa\xe7\x15\xb3\xa9{\xf4p`K\x96\xcb\x88\xe6.a(\xd5\xc67\xf1=2\x86+\x18\xb3\xa6\x90\x8cP\xf3\xd0\xd2\x95\xeb\xc9\x1bF(\x1f\xb2D\xcf\x13\x9a\x8c\xff\x0f\x9dZT\x7f\xc2\x1e\x10\xf9\x84\x92\x9b/\x01\xe8:t\x1b\x96\xa7\xa1\xeb\xd6\x92\x00\xec\xafL\x80[\xd5\x8c\xb2U\xcc\x18\xbc\xe01\xa6\xf3\xdeBs?\xb8\xe8\xe9\xf4#|\x02e\x93G\x06\xa5qk\x7f\x0f\xa3!\x01\t\xdeYS\xdc\x054\xd7\x1eN\xe8h\xb2\xc2*F~\xf4\xabi\xcf)\x8c/jm@S\xce\x94\xc2\x7fp\xa6_\x03\x01|.8\xff\x18U\xe5\xfb\x8c\xd2'}}, {@dont_measure}, {@dont_measure}]}}) 22:27:58 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) [ 906.965782] deactivate_locked_super+0x6c/0xd0 [ 906.967355] Process accounting resumed [ 906.970358] sget_userns+0x9c4/0xc10 [ 906.970366] ? set_bdev_super+0x110/0x110 [ 906.970377] ? ns_test_super+0x50/0x50 [ 906.970388] ? set_bdev_super+0x110/0x110 [ 906.990106] ? ns_test_super+0x50/0x50 [ 906.993992] sget+0xd1/0x110 [ 906.996994] mount_bdev+0xcd/0x360 [ 907.000519] ? fuse_get_root_inode+0xc0/0xc0 [ 907.004906] mount_fs+0x92/0x2a0 [ 907.008253] vfs_kern_mount.part.0+0x5b/0x470 [ 907.012730] do_mount+0xe65/0x2a30 [ 907.016260] ? copy_mount_string+0x40/0x40 [ 907.020477] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 907.025472] ? copy_mnt_ns+0xa30/0xa30 [ 907.029336] ? copy_mount_options+0x1fa/0x2f0 [ 907.033819] ? copy_mnt_ns+0xa30/0xa30 [ 907.037686] SyS_mount+0xa8/0x120 [ 907.041119] ? copy_mnt_ns+0xa30/0xa30 [ 907.044987] do_syscall_64+0x1d5/0x640 [ 907.048864] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 907.054031] RIP: 0033:0x7fc5a09d55a9 [ 907.057720] RSP: 002b:00007fc59f348168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 907.065403] RAX: ffffffffffffffda RBX: 00007fc5a0af5f80 RCX: 00007fc5a09d55a9 [ 907.072651] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 00000000200001c0 [ 907.079905] RBP: 00007fc59f3481d0 R08: 0000000020000440 R09: 0000000000000000 [ 907.087156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 907.094407] R13: 00007ffeeb6bda4f R14: 00007fc59f348300 R15: 0000000000022000 [ 907.102038] Kernel Offset: disabled [ 907.105716] Rebooting in 86400 seconds..