00000340), 0x0, 0x0, 0x0, r0) 07:43:24 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 07:43:24 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000000)="a35a9df1ebe873f05c0e86d5e34089e5647d5a07b94594262dc10f71326783ece4292a4446a64700000000000000000100000000010000000000000076d56b962f65da1ceeeeffc099107f64516bb0ee95cb0943cf") 07:43:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) 07:43:24 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:24 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 07:43:24 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(0x0, r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) r1 = accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) 07:43:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) read$watch_queue(r0, &(0x7f0000000100)=""/218, 0xda) gettid() r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448dc, &(0x7f0000000000)="6ba4c1cd1795c92509694ddd18ac26e69f4f6c74cd4dffacdfcb4e6c122255008b5daef394a56d2e7caca02c988b863b6404448ee072336e5c9d3731283cb1704e01d16d76951f4680b74222a62ba321cdb72f71643e8d28d2a879ce4d6682531788589059f4c998d2cc3a531ad7bf28ca2920c85622033adc556ebd191409096b163016cc2b084fe6737a1a8a8a048213ef8bc9c843d3df6837aa25af38a4ed8a60d3ad4a7388165c180e1f055b8035cc3bcc0af2a1768c40d8dbfaed11825e97d6be13") 07:43:24 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) read$watch_queue(r0, &(0x7f0000000100)=""/218, 0xda) gettid() r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448dc, &(0x7f0000000000)="6ba4c1cd1795c92509694ddd18ac26e69f4f6c74cd4dffacdfcb4e6c122255008b5daef394a56d2e7caca02c988b863b6404448ee072336e5c9d3731283cb1704e01d16d76951f4680b74222a62ba321cdb72f71643e8d28d2a879ce4d6682531788589059f4c998d2cc3a531ad7bf28ca2920c85622033adc556ebd191409096b163016cc2b084fe6737a1a8a8a048213ef8bc9c843d3df6837aa25af38a4ed8a60d3ad4a7388165c180e1f055b8035cc3bcc0af2a1768c40d8dbfaed11825e97d6be13") pipe(&(0x7f0000000000)) (async) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) (async) read$watch_queue(r0, &(0x7f0000000100)=""/218, 0xda) (async) gettid() (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$sock_bt_hci(r1, 0x400448dc, &(0x7f0000000000)="6ba4c1cd1795c92509694ddd18ac26e69f4f6c74cd4dffacdfcb4e6c122255008b5daef394a56d2e7caca02c988b863b6404448ee072336e5c9d3731283cb1704e01d16d76951f4680b74222a62ba321cdb72f71643e8d28d2a879ce4d6682531788589059f4c998d2cc3a531ad7bf28ca2920c85622033adc556ebd191409096b163016cc2b084fe6737a1a8a8a048213ef8bc9c843d3df6837aa25af38a4ed8a60d3ad4a7388165c180e1f055b8035cc3bcc0af2a1768c40d8dbfaed11825e97d6be13") (async) 07:43:25 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)) 07:43:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) 07:43:25 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) (async) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) (async) 07:43:25 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:25 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) ptrace$peekuser(0x3, 0xffffffffffffffff, 0x80000000) 07:43:25 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) 07:43:25 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(0x0, r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) read$watch_queue(r0, &(0x7f0000000100)=""/218, 0xda) (async, rerun: 64) gettid() (async, rerun: 64) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448dc, &(0x7f0000000000)="6ba4c1cd1795c92509694ddd18ac26e69f4f6c74cd4dffacdfcb4e6c122255008b5daef394a56d2e7caca02c988b863b6404448ee072336e5c9d3731283cb1704e01d16d76951f4680b74222a62ba321cdb72f71643e8d28d2a879ce4d6682531788589059f4c998d2cc3a531ad7bf28ca2920c85622033adc556ebd191409096b163016cc2b084fe6737a1a8a8a048213ef8bc9c843d3df6837aa25af38a4ed8a60d3ad4a7388165c180e1f055b8035cc3bcc0af2a1768c40d8dbfaed11825e97d6be13") 07:43:25 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:25 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) ptrace$peekuser(0x3, 0xffffffffffffffff, 0x80000000) 07:43:25 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0xa200, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x202600, 0x0) waitid$P_PIDFD(0x3, r3, &(0x7f00000001c0), 0xa0000000, &(0x7f0000000340)) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000240)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x3, &(0x7f0000002940)=[{&(0x7f00000007c0)="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", 0x841}, {&(0x7f0000000700)='+', 0x1}, {&(0x7f0000002840)='u', 0x1, 0x10001}], 0x0, 0x0) ioctl$sock_bt_hci(r1, 0x400448cc, &(0x7f0000000000)="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") openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x690941, 0x0) 07:43:26 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) 07:43:26 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) ptrace$peekuser(0x3, 0xffffffffffffffff, 0x80000000) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) (async) ptrace$peekuser(0x3, 0xffffffffffffffff, 0x80000000) (async) 07:43:26 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:26 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0xa200, 0x0) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async, rerun: 64) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x202600, 0x0) (rerun: 64) waitid$P_PIDFD(0x3, r3, &(0x7f00000001c0), 0xa0000000, &(0x7f0000000340)) (async) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000240)) (async) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x3, &(0x7f0000002940)=[{&(0x7f00000007c0)="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", 0x841}, {&(0x7f0000000700)='+', 0x1}, {&(0x7f0000002840)='u', 0x1, 0x10001}], 0x0, 0x0) ioctl$sock_bt_hci(r1, 0x400448cc, &(0x7f0000000000)="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") (async, rerun: 64) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x690941, 0x0) (rerun: 64) 07:43:26 executing program 4: setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000000), 0x4) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x67}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) 07:43:26 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0xa200, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x202600, 0x0) waitid$P_PIDFD(0x3, r3, &(0x7f00000001c0), 0xa0000000, &(0x7f0000000340)) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000240)) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x3, &(0x7f0000002940)=[{&(0x7f00000007c0)="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", 0x841}, {&(0x7f0000000700)='+', 0x1}, {&(0x7f0000002840)='u', 0x1, 0x10001}], 0x0, 0x0) ioctl$sock_bt_hci(r1, 0x400448cc, &(0x7f0000000000)="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") openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x690941, 0x0) 07:43:26 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = accept$netrom(r0, &(0x7f0000000180)={{0x3, @default}, [@remote, @remote, @remote, @bcast, @null, @null, @bcast, @bcast]}, &(0x7f0000000000)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000100)=0x2, &(0x7f0000000140)=0x4) 07:43:26 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:26 executing program 4: setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000000), 0x4) (async) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x67}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) 07:43:26 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:26 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0xa200, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300), 0x202600, 0x0) waitid$P_PIDFD(0x3, r3, &(0x7f00000001c0), 0xa0000000, &(0x7f0000000340)) (async) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000240)) (async) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x3, &(0x7f0000002940)=[{&(0x7f00000007c0)="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", 0x841}, {&(0x7f0000000700)='+', 0x1}, {&(0x7f0000002840)='u', 0x1, 0x10001}], 0x0, 0x0) ioctl$sock_bt_hci(r1, 0x400448cc, &(0x7f0000000000)="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") (async) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x690941, 0x0) 07:43:26 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1111.377550] print_req_error: I/O error, dev loop0, sector 0 07:43:27 executing program 4: setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000000), 0x4) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x67}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000000), 0x4) (async) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x67}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) (async) 07:43:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xff, &(0x7f0000000040)=0x2) 07:43:27 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(0x0, r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:27 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) 07:43:27 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:27 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xff, &(0x7f0000000040)=0x2) 07:43:27 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:27 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cc, &(0x7f0000000040)="f3ca8a172200000000000000000100269424053e107ff20caae84519b82ab726bc22000000") ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000080)={"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"}) 07:43:27 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:27 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xff, &(0x7f0000000040)=0x2) 07:43:27 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:27 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"928df56739b341bbec74623044f6986030fea60e841b5d6065346722815f96e8577f4275a04f64d3742590f0e4e8b6b3e2c8a4285614d9f19619485389f34317db876b01d69d75f78beac90e06276da36805b8bbd1fef82db7dc9c9f0edb388eb469ca213f42e9e26c238ac28f9b3fb601985a7e5dd2296438da7f921d729c05868c840f4349f009f84d8cd12e1b452f3dff0b28316ea5dcb5152fa56a20750721749cf0d3bed26e4cb3bd9ef1894a07f61c42e5a4ad01b2719c03eb5b71eeb086c5334d332c53445bfe29a685c98350fd4af06720b6c7202cbd93e46d8618869febf68425def30e154e65e5da99f425665f351f6672bac7973a5dde3e0138a4fd1801cbffd55059a6509e50a45cea66a44baf557618e16626a5b6efcc48a636e8e03c921e20c424fd617c0b1058cba411a9597606094ef34252ed7bc04b313f5badd5ecb4b147a54bc2db1a48cbb71588dbe9e8494f824ba28fd99c8143900ecb7643e8c7056ed4659c4bb8312d3236f2bdf9667b35e810cfd7bfe95eb68dea780d5c923f80744ee721cf81225c9b00bd5a42424bc560bc8f6bdde7508db0f7af3c189afd1e2a0583e881b91715f66333fa35bef2a80e57852483017ef517201ffcf6420ab72e5244869fd2a59d55e72b790f85bbcd6329a22b1dd16fe9dcaac934b949fda5a5a0062aeecd3d51e5233b3e58e2452aeaf5bf0c46502034d484076f65349188eef5966147967b515ff0b89c4553995a876fe93ad7a8673b1d395738357461ff54fba2c69ab48effe1c9eb24b0c67f54429fb0b2803543e0faf0246e659fad4835d58ae01b4b141a91489cc8142529db8a8ba932c3ab28b25249a27d43239c8b0a6fc004bf1e931aa3c10c7184c8032465d408ccbfcc17c8158ab635339ab5e0085c365fc8a3d1146a6fb21c36b3a619720b682f74597466747788295c19e0c1bceca75879e40ebe3019fc68f7ea98f54be2e120888f9550a3abcdfe1c7400dc8b7b7a10e7139dbeab18b87a7a5315331b672cc419bc4542a3db73af8952ceabd65b762efd4bedb51819a9d55cebb8a2825ab536d058edb2580797d72e2ca0189837a97caa37da6a3ccaa1495509e1923a5f929a4ca2076901e6b5ecea787fed9ee26e12e05c71ea8b1a83489f552b281f80b835aa073aa68580b4e1a9d5a4736357ed15985bcf3806614f598ecb126710cc0fe8bf5a4c4dbf8e609e9413fb793430dc478368081219f79451d2b93b7df1301577f38b6739508ca24804a3e9c849623684d7d024e36d273310ac39a303d44baf23db88ee0353c61d8809ea64eebfbdce434abd252c7bfd527211a568620c5e7b81f5fb279fccfb8f4050beef07c9b07e2cd8b9bcc7879668c76497a9e9ec5a5239f945ca2aa92426140cbad48a820388fb453c19e0426136b6f2d4172e6865c754154dd89dacc8"}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) 07:43:27 executing program 4: getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:28 executing program 3: getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r0, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) 07:43:28 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"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"}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"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"}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async) 07:43:28 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:28 executing program 4: getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r0, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) 07:43:28 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:28 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000200)={0x1, 0x4, "038c59", 0x8, 0x9}) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:43:28 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:28 executing program 0: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"928df56739b341bbec74623044f6986030fea60e841b5d6065346722815f96e8577f4275a04f64d3742590f0e4e8b6b3e2c8a4285614d9f19619485389f34317db876b01d69d75f78beac90e06276da36805b8bbd1fef82db7dc9c9f0edb388eb469ca213f42e9e26c238ac28f9b3fb601985a7e5dd2296438da7f921d729c05868c840f4349f009f84d8cd12e1b452f3dff0b28316ea5dcb5152fa56a20750721749cf0d3bed26e4cb3bd9ef1894a07f61c42e5a4ad01b2719c03eb5b71eeb086c5334d332c53445bfe29a685c98350fd4af06720b6c7202cbd93e46d8618869febf68425def30e154e65e5da99f425665f351f6672bac7973a5dde3e0138a4fd1801cbffd55059a6509e50a45cea66a44baf557618e16626a5b6efcc48a636e8e03c921e20c424fd617c0b1058cba411a9597606094ef34252ed7bc04b313f5badd5ecb4b147a54bc2db1a48cbb71588dbe9e8494f824ba28fd99c8143900ecb7643e8c7056ed4659c4bb8312d3236f2bdf9667b35e810cfd7bfe95eb68dea780d5c923f80744ee721cf81225c9b00bd5a42424bc560bc8f6bdde7508db0f7af3c189afd1e2a0583e881b91715f66333fa35bef2a80e57852483017ef517201ffcf6420ab72e5244869fd2a59d55e72b790f85bbcd6329a22b1dd16fe9dcaac934b949fda5a5a0062aeecd3d51e5233b3e58e2452aeaf5bf0c46502034d484076f65349188eef5966147967b515ff0b89c4553995a876fe93ad7a8673b1d395738357461ff54fba2c69ab48effe1c9eb24b0c67f54429fb0b2803543e0faf0246e659fad4835d58ae01b4b141a91489cc8142529db8a8ba932c3ab28b25249a27d43239c8b0a6fc004bf1e931aa3c10c7184c8032465d408ccbfcc17c8158ab635339ab5e0085c365fc8a3d1146a6fb21c36b3a619720b682f74597466747788295c19e0c1bceca75879e40ebe3019fc68f7ea98f54be2e120888f9550a3abcdfe1c7400dc8b7b7a10e7139dbeab18b87a7a5315331b672cc419bc4542a3db73af8952ceabd65b762efd4bedb51819a9d55cebb8a2825ab536d058edb2580797d72e2ca0189837a97caa37da6a3ccaa1495509e1923a5f929a4ca2076901e6b5ecea787fed9ee26e12e05c71ea8b1a83489f552b281f80b835aa073aa68580b4e1a9d5a4736357ed15985bcf3806614f598ecb126710cc0fe8bf5a4c4dbf8e609e9413fb793430dc478368081219f79451d2b93b7df1301577f38b6739508ca24804a3e9c849623684d7d024e36d273310ac39a303d44baf23db88ee0353c61d8809ea64eebfbdce434abd252c7bfd527211a568620c5e7b81f5fb279fccfb8f4050beef07c9b07e2cd8b9bcc7879668c76497a9e9ec5a5239f945ca2aa92426140cbad48a820388fb453c19e0426136b6f2d4172e6865c754154dd89dacc8"}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000000)={"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"}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async) 07:43:28 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:28 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) 07:43:28 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x3fe, 0x3ad241) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) 07:43:28 executing program 5: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:28 executing program 4: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x0, &(0x7f0000004cc0), 0x0, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:28 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x3fe, 0x3ad241) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) 07:43:28 executing program 5: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:28 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x3fe, 0x3ad241) (async, rerun: 64) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 64) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) [ 1113.272230] f2fs_msg: 22 callbacks suppressed [ 1113.272239] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.297961] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1113.323374] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.342069] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 1113.360061] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.377745] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1113.385390] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1113.392499] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 07:43:28 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:29 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000200)={0x1, 0x4, "038c59", 0x8, 0x9}) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:43:29 executing program 5: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:29 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0xd0c80, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRESHEX=r0], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4$x25(r0, 0x0, &(0x7f0000000080), 0x80800) write$P9_RWRITE(r0, &(0x7f0000000200)={0xb, 0x77, 0x1, 0x6}, 0xb) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), r0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x1, &(0x7f0000004cc0)=[{&(0x7f0000002440)="c1", 0x1, 0xd800000000000000}], 0x2005498, 0x0) 07:43:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:29 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0xd0c80, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRESHEX=r0], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) accept4$x25(r0, 0x0, &(0x7f0000000080), 0x80800) write$P9_RWRITE(r0, &(0x7f0000000200)={0xb, 0x77, 0x1, 0x6}, 0xb) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), r0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) (async) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:29 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:29 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0xd0c80, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRESHEX=r0], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4$x25(r0, 0x0, &(0x7f0000000080), 0x80800) (async) write$P9_RWRITE(r0, &(0x7f0000000200)={0xb, 0x77, 0x1, 0x6}, 0xb) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280), r0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x3f}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x80}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) (async) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:29 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:29 executing program 4: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x1, &(0x7f0000004cc0)=[{&(0x7f0000002440)="c1", 0x1, 0xd800000000000000}], 0x2005498, 0x0) 07:43:29 executing program 0: r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x9, 0x20, 0x7560, 0x9, 0x1, 0x1b, 0x18, "a0e2a682595be6a497cc5caa8e4cc45bfffd7036", "a5b29c61e4aff14b5fd072d99dc40300e0392bee"}) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x100000000) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000000c0)) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:29 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:30 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000200)={0x1, 0x4, "038c59", 0x8, 0x9}) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:43:30 executing program 0: r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x9, 0x20, 0x7560, 0x9, 0x1, 0x1b, 0x18, "a0e2a682595be6a497cc5caa8e4cc45bfffd7036", "a5b29c61e4aff14b5fd072d99dc40300e0392bee"}) (async) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x100000000) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000000c0)) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:30 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c", 0x33}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:30 executing program 4: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x1, &(0x7f0000004cc0)=[{&(0x7f0000002440)="c1", 0x1, 0xd800000000000000}], 0x2005498, 0x0) 07:43:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:30 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:30 executing program 0: r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x9, 0x20, 0x7560, 0x9, 0x1, 0x1b, 0x18, "a0e2a682595be6a497cc5caa8e4cc45bfffd7036", "a5b29c61e4aff14b5fd072d99dc40300e0392bee"}) (async) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x100000000) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000000c0)) (async) ioctl$sock_bt_hci(r1, 0x400448c9, &(0x7f00000007c0)) 07:43:30 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:30 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:30 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0x9, [0x267, 0x5], 0x7}, 0x10) ioctl$vim2m_VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x8, 0xffffffff, 0x2, {0x2, @raw_data="45581bca3501e405c99cbd1ae0cb3fa34d42c9dc5971ddb2e952a58133ac59814c397fd912e9c362d131c590c0d6d8e965e406acfe7dc6080efb9bab7d92624542f5bd5ba69d10ec3152ba7e4083c09f9f10145432b22fd723b3e502d0d3c88d039002cdca22cd171d5593b200be046a9309f30a6344512d98973e442a2acb5700fa417267553b7b6c48f5edba36c8ee9e241a6c5e68ef379bacc3347f25f140194a05c85d4a673b1162a187c080d43db3210403b0b8ae6692bdd39afa482b516732df45031a7a6d"}, 0x5a8e}) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000100)="9746a42d6d467e5aa01f8fe3ecff93af7b035501a4940054d029612dbe49fbb975a655bff89510131247805240fb320f2294cdd25d408a9325df00bfa43acad9f239e6a15203eb7ad1157cf4e099bf9db682c22449c0647c3ea087cf0202c0bf6475810509193ac3e5ada372f7cbeece67980e231bd54e5b02205bc3a99f043fd5f7b40c97440f162b5a5409977e8739bf6a717fcf1d542a4176e04ca3d23304a173fbde9c28f12824a7965cd70f7c7230368e293342b5e7360aab30b2b5") 07:43:30 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:30 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) [ 1115.233577] Bluetooth: hci1 command 0x0401 tx timeout 07:43:31 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000200)={0x1, 0x4, "038c59", 0x8, 0x9}) 07:43:31 executing program 4: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x1, &(0x7f0000004cc0)=[{&(0x7f0000002440)="c1", 0x1}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:31 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) (async) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async, rerun: 32) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0x9, [0x267, 0x5], 0x7}, 0x10) (rerun: 32) ioctl$vim2m_VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x8, 0xffffffff, 0x2, {0x2, @raw_data="45581bca3501e405c99cbd1ae0cb3fa34d42c9dc5971ddb2e952a58133ac59814c397fd912e9c362d131c590c0d6d8e965e406acfe7dc6080efb9bab7d92624542f5bd5ba69d10ec3152ba7e4083c09f9f10145432b22fd723b3e502d0d3c88d039002cdca22cd171d5593b200be046a9309f30a6344512d98973e442a2acb5700fa417267553b7b6c48f5edba36c8ee9e241a6c5e68ef379bacc3347f25f140194a05c85d4a673b1162a187c080d43db3210403b0b8ae6692bdd39afa482b516732df45031a7a6d"}, 0x5a8e}) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000100)="9746a42d6d467e5aa01f8fe3ecff93af7b035501a4940054d029612dbe49fbb975a655bff89510131247805240fb320f2294cdd25d408a9325df00bfa43acad9f239e6a15203eb7ad1157cf4e099bf9db682c22449c0647c3ea087cf0202c0bf6475810509193ac3e5ada372f7cbeece67980e231bd54e5b02205bc3a99f043fd5f7b40c97440f162b5a5409977e8739bf6a717fcf1d542a4176e04ca3d23304a173fbde9c28f12824a7965cd70f7c7230368e293342b5e7360aab30b2b5") 07:43:31 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:31 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:31 executing program 2: pipe(&(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:31 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:31 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f00000007c0)) (async) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0x9, [0x267, 0x5], 0x7}, 0x10) ioctl$vim2m_VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000000)={0x8, 0xffffffff, 0x2, {0x2, @raw_data="45581bca3501e405c99cbd1ae0cb3fa34d42c9dc5971ddb2e952a58133ac59814c397fd912e9c362d131c590c0d6d8e965e406acfe7dc6080efb9bab7d92624542f5bd5ba69d10ec3152ba7e4083c09f9f10145432b22fd723b3e502d0d3c88d039002cdca22cd171d5593b200be046a9309f30a6344512d98973e442a2acb5700fa417267553b7b6c48f5edba36c8ee9e241a6c5e68ef379bacc3347f25f140194a05c85d4a673b1162a187c080d43db3210403b0b8ae6692bdd39afa482b516732df45031a7a6d"}, 0x5a8e}) (async) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f0000000100)="9746a42d6d467e5aa01f8fe3ecff93af7b035501a4940054d029612dbe49fbb975a655bff89510131247805240fb320f2294cdd25d408a9325df00bfa43acad9f239e6a15203eb7ad1157cf4e099bf9db682c22449c0647c3ea087cf0202c0bf6475810509193ac3e5ada372f7cbeece67980e231bd54e5b02205bc3a99f043fd5f7b40c97440f162b5a5409977e8739bf6a717fcf1d542a4176e04ca3d23304a173fbde9c28f12824a7965cd70f7c7230368e293342b5e7360aab30b2b5") 07:43:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 07:43:31 executing program 4: add_key$fscrypt_v1(&(0x7f00000020c0), 0x0, 0x0, 0x0, 0xfffffffffffffff8) iopl(0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socket$l2tp6(0xa, 0x2, 0x73) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{}], [{@fsmagic}, {@uid_lt={'uid<', r2}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@euid_eq}]}}) r3 = getegid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x888e1, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6e81907a9479a19e}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@max_read={'max_read', 0x3d, 0x1f}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@dont_hash}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, 'logon\x00'}}, {@dont_measure}, {@pcr={'pcr', 0x3d, 0x36}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'logon\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'logon\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7ff}}, {@obj_role}]}}) 07:43:31 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:31 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000), 0x6) 07:43:32 executing program 4: syz_open_dev$vim2m(&(0x7f0000000380), 0x5, 0x2) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000001c0)="63690026539dfabf17b83513a9ec1069d6f42f18ce4619f963029e776e14e7c48b32b34eae7be360a733b681b40a4684bd8e680082f7ecca3c3923d8daee93a0984714af7eb2f1e7bcc3c721e04541d382ce58c00ce4479758485b469f39c135125e297b9af76c87f960aa5fd739f47852e43b08c32d4966ee643571c3860db30ec8aae9f6b17ed8ea1eac93b1264dfdbea362a80912f27f224a1479bdf86efaa294d1ff67bd09edfb638c938d0ed2b9b10387ce33333201348ef6d8b805974cd50f552c1e33a4ae86bd068d67def6052c1d3487c21c27e0ab4c9cb725d1ab62a0af8e2b8283da8b9a573cf7a07f") ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000003c0)={[0x4000, 0xf000, 0x4, 0x6000], 0x9, 0xa8, 0x7}) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f00000002c0)="ab0bce6bf446aff18c2f6db9271486c6b84b9ae9da90c6bb72143dd6ffc4905c2d145472850a21b4443a67df95bb360e6ef62118a0e145dc4bd9dff044a202bc94b6150ac7526fcd4a13e25ffa5f0376f9e8d2ccc1187e3c9761bdafe93e759bf10b66cfce66d56f5a80b0acf158ce89e5e892db055a3526878c0a35612e77bdad72bd1d0babc4f4c3bc59b659dbf064c201f4f32c3eb9d65adc27bdf4d42d4641fe4325cecf80d9122ac52463137a8c338051ca") ioctl$sock_bt_hci(r0, 0x400448c9, &(0x7f0000000000)="51c3058633a2f68edbd4cb042a48d5a7fe2caa83f38c3cf81a3e8412635d5603e762e3babb2ff75ba0543317b3956dc150ad533397c67d526b883172ecad46c50d07740f1af9f46f26a28b5f394ca0368744c0af765a133e5c72c4a5e86d0f89ec4cc33e75c9e830e9b33c28c0b3fc84a1ec1aa44cc33d60426c3cda9a4ad764411d4d2226a96bef655132caf9eb32ac39c3eef87510f987a1c6d078e180d6a93c218515e359508ab7129acb4bb0a5fae8c75d2f591e8998760d5af1ffc2286750aab995c8af8abf3dbaff93aa8a01573ec93420d8e202e796aa5dcef581e71869560ff22c494348085881f20910602207f84340a0c326c66de792087b0fe955821d39debdf9d383190cc8bf784755a501a3371eaa2d4ca36f460473938bc03d4e906101ca1a02a4700c38b8934cce3de249a17800c489ea33544968c2a6abf41b612e08d8e13521f638435fc836a42260b1acd8c19b7485deb94eda8c5a135948d35c12dfae914a296603a605fa3b49fd26d8e66ee80f2c16dfda00"/393) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000004c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000440)=r2) write$P9_RMKDIR(r2, &(0x7f0000000480)={0x14, 0x49, 0x1, {0x80, 0x0, 0x1}}, 0x14) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:43:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 07:43:32 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:32 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 07:43:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 07:43:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(0x0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:32 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:32 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 07:43:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:32 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) [ 1117.313295] Bluetooth: hci1 command 0x0401 tx timeout 07:43:32 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x7a, 0x0, 0x6a3, r1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000040)={0xffffffffffffffff, 0x5, "0583a2", 0x0, 0x40}) bind$bt_rfcomm(r2, &(0x7f0000000140)={0x1f, @any, 0x40}, 0xa) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0xe4, 0x29, 0x1, {0xfffffff9, [{{0x10, 0x2, 0x5}, 0x101, 0x29, 0x7, './file0'}, {{0x2, 0x4, 0x6}, 0x6, 0x7, 0x7, './file0'}, {{0x2, 0x4}, 0x8, 0x55, 0x7, './file0'}, {{0x8, 0x1}, 0x2, 0x5, 0x7, './file0'}, {{0x2, 0x0, 0x2}, 0x2, 0x95, 0x7, './file0'}, {{0x20, 0x3, 0x3}, 0x749e, 0x1, 0x7, './file0'}, {{0x20, 0x1, 0x1}, 0xffffffff, 0x3, 0x7, './file0'}]}}, 0xe4) write$P9_RUNLINKAT(r1, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030302c00fd601f3021fb924e456d42c93101f29c1f8929c68b23f157ec17aef22c9d34e770cca01186c491a9ca564b1c93ffa01bf8420a5437dd49d1ccd722e39baa"]) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0xffffffffffffffff) iopl(0x2) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000180)=0x4, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0), 0x421000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getegid() write$FUSE_CREATE_OPEN(r3, &(0x7f0000000400)={0xa0, 0xfffffffffffffffe, 0x0, {{0x2, 0x2, 0x5, 0x800, 0x240, 0x3, {0x3, 0x7, 0x2, 0x126, 0x8b, 0x3, 0x9, 0x3, 0x2, 0xa000, 0x800, r4, r5, 0xffffffff, 0x80000000}}, {0x0, 0x4}}}, 0xa0) write$P9_RLERROR(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x9) r6 = accept4$x25(r0, &(0x7f0000000300)={0x9, @remote}, &(0x7f0000000340)=0x12, 0x80000) ioctl$SIOCX25SDTEFACILITIES(r6, 0x89eb, &(0x7f0000000380)={0x7fff, 0x40, 0x8000, 0x5, 0xf, 0x17, 0x1c, "835dd4c5d5dd9cc438d1c74f7f62356b13131558", "363519318255e4d1746ad71e834be8c5e887fae8"}) 07:43:32 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 07:43:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:32 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r2, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) 07:43:32 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:33 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:33 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(0x0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:33 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r1, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) 07:43:33 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 07:43:33 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, 0x0, 0x0) 07:43:33 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) 07:43:33 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f00000020c0), 0x0, 0x0, 0x0, 0xfffffffffffffff8) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "8cce91baadc327f2e88e00ad83de02522c9e0525b60119f396caa5d0ab84022498b6b1f6719fbabaa54b8dd86b3c335dbcb5b72366e218ff102a3e66ed6b4d5f", 0x3c}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "8663f4bbfdb5b53c62231d2055f53b53b76178443b6f2e2b99567a87ae8744acb52e8f129a467866eae3964b6770c85ed0680fa27c70ac785bad2d748440dd33", 0x2a}, 0x48, r1) 07:43:33 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) 07:43:33 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 07:43:33 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) 07:43:33 executing program 5: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) write$FUSE_BMAP(r1, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x0, {0x200}}, 0x18) 07:43:34 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(0x0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:34 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:34 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000000)) 07:43:34 executing program 0: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:34 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, r1) 07:43:34 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @auto=[0x65, 0x35, 0x31, 0x0, 0x24, 0x35, 0x34, 0x65, 0x32, 0x50, 0x34, 0x62, 0x0, 0x65, 0x39, 0x31]}, &(0x7f00000000c0)={0x0, "ee0568aa4259dd1e1b3e925c0ccf364068ab1787e5ae3cc80dd22adbf57686df68505723899e2c1674e21b23c44032c8b0a08897a65111e7ae303a6455dbc258", 0x27}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "253939588d3cee004ea5e46a9f1b28a7f114f0a329359d15bd88b0f46e7799a86abd07202c38af2c14b5901513201a9821a3d2db2f415df7a2d33bf0de287887", 0x1f}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000240), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r1, 0xffffffffffffffff, 0x7d) 07:43:34 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) 07:43:34 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:34 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:34 executing program 5: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x2, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440), 0x0, 0xd800000000000000}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:34 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) pipe(&(0x7f0000000000)) 07:43:34 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) [ 1119.393094] Bluetooth: hci1 command 0x0401 tx timeout 07:43:35 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:35 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) 07:43:35 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:35 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) 07:43:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, "4883dbb599b00195b7f9a0a18d078578da80f24ab69edc26aa342bd0dd1706bc65ed0804314b93e4b18c8cd47c8c794138218c0c23be3a823485700cc0f7e48c"}, 0x48, 0xfffffffffffffffc) 07:43:35 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "467490e4d80f338fe7832a01ea5803b1b5df102e44d5caedf32c49e53aac9c335b1bf87e36e681662a66595b7ac04cfadfb086b4c21962a845a473f8b3001893", 0x33}, 0x48, r0) 07:43:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) 07:43:35 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:35 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:35 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) 07:43:35 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f0000000240)=0x2) 07:43:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) 07:43:35 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:35 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:35 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:35 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 07:43:35 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffc) 07:43:36 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:36 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:36 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) 07:43:36 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) [ 1121.472794] Bluetooth: hci1 command 0x0401 tx timeout 07:43:36 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:36 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:36 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:36 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:37 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:37 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:37 executing program 0: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 07:43:37 executing program 3: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/215, 0xfffffffffffffe2c, 0x40, &(0x7f0000000100), 0x12) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:37 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:37 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:37 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:37 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:37 executing program 0: syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0x0, 0x5, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:37 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffe) 07:43:37 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) 07:43:37 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:37 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:37 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffe) 07:43:38 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:38 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:38 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:38 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000007c0)) 07:43:38 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffe) 07:43:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), r4) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:38 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, "e10dc0e88255606d82a06b314e9a535cf8bcdac81b099a25c38eb0bcb26f5e3f5a2de10694efa36b2da1340cc8f8e782a1c86b6e43940fff922919a6b67da4e2", 0x2f}, 0x48, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:38 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r4) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:38 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448de, &(0x7f00000007c0)) 07:43:38 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:38 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffe) 07:43:39 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:39 executing program 2: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4b3e4c4a5531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffe) 07:43:39 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:39 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:39 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) socket$inet_sctp(0x2, 0x5, 0x84) 07:43:39 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:39 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:39 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:39 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:39 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:39 executing program 0: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:39 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:39 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:39 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000600)={{0x0, 0x0, 0x80}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000140)={0x0, 0x4, r1, 0x8, 0x80000}) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:39 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, 0x0) 07:43:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:40 executing program 0: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:40 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:40 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r1, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:40 executing program 0: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, 0x0, 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, 0x0) 07:43:40 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r1, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) pipe(&(0x7f0000000000)) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:40 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448de, 0x0) 07:43:41 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:41 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0), 0xfffffe4f) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:41 executing program 2: syz_mount_image$f2fs(0x0, &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:41 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r1, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:41 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:41 executing program 3: syz_mount_image$f2fs(0x0, &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:41 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:41 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:41 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:41 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) pipe(&(0x7f0000000000)) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:41 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:43:41 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:42 executing program 2: syz_mount_image$f2fs(0x0, &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:43:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:43:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:43:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff8a, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:42 executing program 2: syz_mount_image$f2fs(0x0, &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) 07:43:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff8a, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:42 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x4080}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) 07:43:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:43:42 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff8a, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:42 executing program 2: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x5, 0x6]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40040}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffec1, 0xfffffffffffffffc) 07:43:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) 07:43:42 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x90002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:42 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000002500)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}, {@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@dont_hash}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@subj_role}, {@obj_user={'obj_user', 0x3d, ':}'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xd5'}}, {@audit}]}}) iopl(0x1) iopl(0x2) syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:43 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:43 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff8a, r0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:43 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) 07:43:43 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000002500)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}, {@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x4}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@dont_hash}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@subj_role}, {@obj_user={'obj_user', 0x3d, ':}'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xd5'}}, {@audit}]}}) iopl(0x1) iopl(0x2) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) syz_mount_image$f2fs(&(0x7f0000002240), &(0x7f0000002380)='./file0\x00', 0xfff, 0xa, &(0x7f0000004cc0)=[{&(0x7f00000023c0)="d663c4d74a0101b4d10d9c1bd796b1ded6cf37150378f07afe6f3bcf270ad4e32d60ac7d64a350447813a69c2aca961d610f01102f2952ef48792f83263cfb6b02fcb3ebf1dfa787d4913a4647dcc8316c4c915c", 0x54, 0x8}, {&(0x7f0000002440)="c1870c46e8508436bdf91485e020cc05a4c35c00b46ec3ce122170adfb530348a49d089eba268338a0a529fb3f47229412ca280ebe7968f012d91c9cdb0d543dfc5cca520ee72716245f", 0x4a, 0xd800000000000000}, {&(0x7f0000004700)="ab8003339c11a368211b333f43888a17cf7c7d74148b1e6753e71e1b4edf8378538c5048111ab2289ea712d5e364fec24bf811b0dacd7289cf6ee17eddacf891017d", 0x42, 0x3}, {&(0x7f0000004780)="85232b29cd1bc35d506934421a71f6524a1a406762cfc695ae6647460a1ef240b6d380d76d16fde09649554766a19f5b92b6b34228376679d24bbc811fe54508f93ba8bcf6d5c0b87805c7da7ee46628247567bd801190eba66f33b998ee2919ec291bd0c60a9d78b77d559f4cc21b3f959732baaa6be30c99b45e8ebedc28e190fa8308315c91f8197e68ae711ad3c7c656401b1f7fad3d13b06f96d356f9b483a76ad881d834a4e7d95141b87eb0cdeca02774f2ca3c0329a7a7e1aff877e52a2c6b9cf1", 0xc5, 0x8000000000000001}, {&(0x7f0000004880)="51437d1ef848d8108e162af052c9a83fd475a90ef475e326b1d94791ae4e4c84ec8a98719419357d6907d2dcf338e535e752eb5c16dedbf5b07862d3c36658c0fe61504e0f5bd2b85240834a45a4b5363fe4df84800adab25a4f7ebb8469eb91338702cf8995fe1099195178bb53f5b743d00c06d2a82a45397c7727d4671e9e64be38ac07c579476709815a3bfb2079be7f93f64dbb93e4d56736a871e88ba68a", 0xa1, 0x1}, {&(0x7f0000004940)="7c306ecf9dbcfdeb669f6b16e70a1761703d05a306d282c40b5a90a069405da22842d157f6ea4a57ed0351ac1d1c32992ff257f76a659140fb5f6f9c44ce6a911bbe9f8b16d3c87155f9e710c47601fafd3d2d87017bfe1ca9862c200ab58b457860cd0faca5e9f6e086bdb26f5b482ebb53ec9110cad4e740d11db3ee4b16c3b3632e895ca1c1e8e762c3a2015c938d6675775a024492a7e551d86e9d1ea1317c956fd509c1e11994909198e5e988cfbef75e", 0xb3, 0x1}, {&(0x7f0000004a00)="8e5206e79fc6cc9f1b1330db99d8b3ed93c15c912a025288c57f86b2b18ae37fa1bc46b61310457ddebe64e9e164d5d4e03ca5b773b59c566d17cb099ad35db08b5a7a83ce7eef7b077ee6411871594811a475d8fdd177d4713c1790a119e293", 0x60, 0x50a}, {&(0x7f0000004a80)="db7bffb41787752af8d6a8f01c4f3c5d136ecd54c0d2bdad08d90962acf0e5937f7d69173036a7e247220f705deb4d32135d0988b4917ba8829bae5ccbec63295c8e162c8e5e7c9caea4c4", 0x4b, 0x6}, {&(0x7f0000004b00)="4c21a1dd321d995cdf2beac0e8097f588eabaa9f8c23f0fe9d04a5e7070d6eae890fd6b66d3d60bc340d5726537a29bdd451eec92bd075905190ef11765b045f388dd96aa87400b2c011c0071097923435f770b5863f2c4e794e151923089ec84c2df1e86afcc82f6e1e3b38beacd2720fc768bf755135a88ad7769e3edd20b537f1c0a88d337c2901b85a518dacfbab8d1ade3762e6aaf83f52e7da0d3a05e910a1075859aabdc750b8246d8bb50d23", 0xb0, 0x8}, {&(0x7f0000004bc0)="fb118094dcc2ec091428067990cedd347a30e3eb3cc9fbdda6641a1054b693153e827a4b379770d871004412d7cce995c3527d40fba74b1d79fd749e9b9c9309f3d8b4ffd1bee6ed67e9a7ccf89eda3ed6e69538052974d859b39ecdbff965b6c84e37225425794a7bb8fe47ee6df7b50cbd3d90bcbad07ec3a8701f9b2d6e375ef9629559a25196d3430171f97fb616eef11f9f9cb76051e5e6f54048c6f1a3bb05aca2d1d1e57fd30653ab5f019d03dfb1a7d771bae5f1852a10d0f345fe8a2fa4e6793e7d5154b7c4", 0xca, 0x4}], 0x2005498, &(0x7f0000004dc0)={[{@noquota}, {@disable_ext_identify}, {@extent_cache}, {@prjquota={'prjquota', 0x3d, 'smackfsdef'}}], [{@measure}, {@dont_appraise}, {@appraise_type}]}) 07:43:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:43 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000000)) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 07:43:43 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:43 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) 07:43:43 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000000)) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 07:43:43 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:43 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) 07:43:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) 07:43:43 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:43 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000000)) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 07:43:43 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:44 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000000)) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) 07:43:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:44 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (fail_nth: 1) 07:43:44 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:44 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:44 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) 07:43:44 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) [ 1128.731837] FAULT_INJECTION: forcing a failure. [ 1128.731837] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.774875] CPU: 1 PID: 30326 Comm: syz-executor.2 Not tainted 4.14.281-syzkaller #0 [ 1128.782876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.792231] Call Trace: [ 1128.794827] dump_stack+0x1b2/0x281 [ 1128.798468] should_fail.cold+0x10a/0x149 [ 1128.802623] should_failslab+0xd6/0x130 [ 1128.806602] kmem_cache_alloc_node+0x54/0x410 [ 1128.811102] __alloc_skb+0x5c/0x510 [ 1128.814738] create_monitor_ctrl_open+0x130/0x630 [ 1128.819588] ? hci_sock_setsockopt+0x5b0/0x5b0 07:43:44 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) [ 1128.824175] ? do_raw_spin_unlock+0x164/0x220 [ 1128.828693] ? _raw_spin_unlock+0x29/0x40 [ 1128.832847] hci_sock_bind+0x950/0x12b0 [ 1128.836827] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1128.840976] ? security_socket_bind+0x83/0xb0 [ 1128.845480] SyS_bind+0x174/0x1f0 [ 1128.848938] ? SyS_socketpair+0x480/0x480 [ 1128.853091] ? wait_for_completion_io+0x10/0x10 [ 1128.857765] ? vfs_write+0x319/0x4d0 [ 1128.861492] ? fput_many+0xe/0x140 [ 1128.865038] ? SyS_write+0x14d/0x210 [ 1128.868753] ? SyS_read+0x210/0x210 07:43:44 executing program 3: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) [ 1128.872375] ? __do_page_fault+0x159/0xad0 [ 1128.876607] ? do_syscall_64+0x4c/0x640 [ 1128.880579] ? SyS_socketpair+0x480/0x480 [ 1128.884723] do_syscall_64+0x1d5/0x640 [ 1128.888615] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1128.893801] RIP: 0033:0x7f045ea27109 [ 1128.897505] RSP: 002b:00007f045d39c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1128.905211] RAX: ffffffffffffffda RBX: 00007f045eb39f60 RCX: 00007f045ea27109 [ 1128.912483] RDX: 0000000000000006 RSI: 0000000020000000 RDI: 0000000000000004 07:43:44 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) [ 1128.919749] RBP: 00007f045d39c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.927015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1128.934282] R13: 00007ffd7efeef5f R14: 00007f045d39c300 R15: 0000000000022000 07:43:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:44 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:44 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (fail_nth: 2) [ 1129.508257] FAULT_INJECTION: forcing a failure. [ 1129.508257] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.519864] CPU: 0 PID: 30359 Comm: syz-executor.2 Not tainted 4.14.281-syzkaller #0 [ 1129.527753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.537098] Call Trace: [ 1129.539679] dump_stack+0x1b2/0x281 [ 1129.543298] should_fail.cold+0x10a/0x149 [ 1129.547523] should_failslab+0xd6/0x130 [ 1129.551498] kmem_cache_alloc_node_trace+0x58/0x400 [ 1129.556508] __kmalloc_node_track_caller+0x38/0x70 [ 1129.561426] __alloc_skb+0x96/0x510 [ 1129.565156] create_monitor_ctrl_open+0x130/0x630 [ 1129.569978] ? hci_sock_setsockopt+0x5b0/0x5b0 [ 1129.574551] ? do_raw_spin_unlock+0x164/0x220 [ 1129.579043] ? _raw_spin_unlock+0x29/0x40 [ 1129.583182] hci_sock_bind+0x950/0x12b0 [ 1129.587155] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1129.591282] ? security_socket_bind+0x83/0xb0 [ 1129.595775] SyS_bind+0x174/0x1f0 [ 1129.599219] ? SyS_socketpair+0x480/0x480 [ 1129.603353] ? wait_for_completion_io+0x10/0x10 [ 1129.608016] ? vfs_write+0x319/0x4d0 [ 1129.611713] ? fput_many+0xe/0x140 [ 1129.615244] ? SyS_write+0x14d/0x210 [ 1129.618946] ? SyS_read+0x210/0x210 [ 1129.622565] ? __do_page_fault+0x159/0xad0 [ 1129.626791] ? do_syscall_64+0x4c/0x640 [ 1129.630749] ? SyS_socketpair+0x480/0x480 [ 1129.634886] do_syscall_64+0x1d5/0x640 [ 1129.638767] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1129.643943] RIP: 0033:0x7f045ea27109 [ 1129.647632] RSP: 002b:00007f045d39c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 07:43:45 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:45 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:45 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:45 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (fail_nth: 3) [ 1129.655541] RAX: ffffffffffffffda RBX: 00007f045eb39f60 RCX: 00007f045ea27109 [ 1129.662889] RDX: 0000000000000006 RSI: 0000000020000000 RDI: 0000000000000004 [ 1129.670140] RBP: 00007f045d39c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.677396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1129.684670] R13: 00007ffd7efeef5f R14: 00007f045d39c300 R15: 0000000000022000 07:43:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x8000) 07:43:45 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:45 executing program 4: ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 07:43:45 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x8000) 07:43:45 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000007c0)) 07:43:45 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) 07:43:45 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:45 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36, 0x34]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:45 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (fail_nth: 1) 07:43:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, 0x0, 0x8000) 07:43:45 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54bafd006243dc53cf4003809fa48023839106eb5250a5e3117e654f4c4ed0063531357010ddadc61b6dc48c9", 0x413}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:45 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 07:43:46 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:46 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:46 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30, 0x36]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:46 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54bafd006243dc53cf4003809fa48023839106eb5250a5e3117e654f4c4ed0063531357010ddadc61b6dc48c9", 0x413}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x2}, 0x6) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @netrom, @remote, @bcast, @null, @rose, @bcast, @rose]}, &(0x7f00000000c0)=0x48) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180), 0x4) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0xfffeffff, 'syz1\x00', @null, 0x200, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) 07:43:46 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54bafd006243dc53cf4003809fa48023839106eb5250a5e3117e654f4c4ed0063531357010ddadc61b6dc48c9", 0x413}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:46 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000007c0)) 07:43:46 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:46 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x2}, 0x6) (async, rerun: 32) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @netrom, @remote, @bcast, @null, @rose, @bcast, @rose]}, &(0x7f00000000c0)=0x48) (async, rerun: 32) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180), 0x4) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0xfffeffff, 'syz1\x00', @null, 0x200, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) 07:43:46 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:47 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:47 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:47 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7d4761ddfd09b74fe6b804687c14ecb793693ccd5ffe11eb69e19846d566f5eaea9149d7b3d555d1fe614ca92dd45101e2e5eb184fcab188d9df021e3903ec97", 0x13}, 0x48, r0) 07:43:47 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:47 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x2}, 0x6) (async) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @netrom, @remote, @bcast, @null, @rose, @bcast, @rose]}, &(0x7f00000000c0)=0x48) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000180), 0x4) (async) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0xfffeffff, 'syz1\x00', @null, 0x200, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) 07:43:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:47 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:47 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = getpgrp(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x4, &(0x7f00000000c0)='\x90 \xc3o\r\x12\x1c\xbc[f9\xa9\x8cv\xfc\x8e\xa9\x8d\xbfX\xcc\xd9+\f8\v\b\xb2\xa8C\x96\x19\xb0B 3p\x05\xb1\xf1\x15+\x10\xcb\xe5\n\xa6!\xdcI\xca\xe3\xc3\xb3\xd3\xc2H\x17\xd8\x93\xc5r\a\x15A%*\xb7\xed\xcc\xdc-\xa3\xdd\x8c\xe5o\xed\xc2\x93\xaa?c\xb5:\x11\x98F\x86\xc7\xe0\x8aueX4\x84\ng\xa8\x94\x17\xaf\x03\xdf\xbf\xc7\xa3G\xff\x00\x00\x00\x1a\xc8\xad\x04\xad\xb4\xfdv\xfd_2\'\x94\x17\x99\xc4\xb4\xe5\x97\x93Z7R\"\x9f \x99t;zIp\xba\x8c[C\xfb \xddv2=\x8f\xeb\x89\xca|\xd6+c\xee3\xbb\xaf\xf9\x98\v\x80\x06{\xbf6+s\r\x14~:\xae$\x12'}, 0xff9b) getpgrp(r1) 07:43:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:47 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 32) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7d4761ddfd09b74fe6b804687c14ecb793693ccd5ffe11eb69e19846d566f5eaea9149d7b3d555d1fe614ca92dd45101e2e5eb184fcab188d9df021e3903ec97", 0x13}, 0x48, r0) 07:43:47 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000007c0)) 07:43:47 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:48 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:48 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = getpgrp(0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x4, &(0x7f00000000c0)='\x90 \xc3o\r\x12\x1c\xbc[f9\xa9\x8cv\xfc\x8e\xa9\x8d\xbfX\xcc\xd9+\f8\v\b\xb2\xa8C\x96\x19\xb0B 3p\x05\xb1\xf1\x15+\x10\xcb\xe5\n\xa6!\xdcI\xca\xe3\xc3\xb3\xd3\xc2H\x17\xd8\x93\xc5r\a\x15A%*\xb7\xed\xcc\xdc-\xa3\xdd\x8c\xe5o\xed\xc2\x93\xaa?c\xb5:\x11\x98F\x86\xc7\xe0\x8aueX4\x84\ng\xa8\x94\x17\xaf\x03\xdf\xbf\xc7\xa3G\xff\x00\x00\x00\x1a\xc8\xad\x04\xad\xb4\xfdv\xfd_2\'\x94\x17\x99\xc4\xb4\xe5\x97\x93Z7R\"\x9f \x99t;zIp\xba\x8c[C\xfb \xddv2=\x8f\xeb\x89\xca|\xd6+c\xee3\xbb\xaf\xf9\x98\v\x80\x06{\xbf6+s\r\x14~:\xae$\x12'}, 0xff9b) (async) getpgrp(r1) 07:43:48 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, 0x0) 07:43:48 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7d4761ddfd09b74fe6b804687c14ecb793693ccd5ffe11eb69e19846d566f5eaea9149d7b3d555d1fe614ca92dd45101e2e5eb184fcab188d9df021e3903ec97", 0x13}, 0x48, r0) 07:43:48 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:48 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:48 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, 0x0) 07:43:48 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) r1 = getpgrp(0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async, rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x4, &(0x7f00000000c0)='\x90 \xc3o\r\x12\x1c\xbc[f9\xa9\x8cv\xfc\x8e\xa9\x8d\xbfX\xcc\xd9+\f8\v\b\xb2\xa8C\x96\x19\xb0B 3p\x05\xb1\xf1\x15+\x10\xcb\xe5\n\xa6!\xdcI\xca\xe3\xc3\xb3\xd3\xc2H\x17\xd8\x93\xc5r\a\x15A%*\xb7\xed\xcc\xdc-\xa3\xdd\x8c\xe5o\xed\xc2\x93\xaa?c\xb5:\x11\x98F\x86\xc7\xe0\x8aueX4\x84\ng\xa8\x94\x17\xaf\x03\xdf\xbf\xc7\xa3G\xff\x00\x00\x00\x1a\xc8\xad\x04\xad\xb4\xfdv\xfd_2\'\x94\x17\x99\xc4\xb4\xe5\x97\x93Z7R\"\x9f \x99t;zIp\xba\x8c[C\xfb \xddv2=\x8f\xeb\x89\xca|\xd6+c\xee3\xbb\xaf\xf9\x98\v\x80\x06{\xbf6+s\r\x14~:\xae$\x12'}, 0xff9b) (async, rerun: 32) getpgrp(r1) 07:43:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:48 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, 0x0) 07:43:48 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6858c78925797006b4908ee22f3d04e95f084dd23ada55774bb9493d8d0438dbc55b1b7fe82869e064bca6c6cc946e156fb4e30fce7694b57e218572e752cc71", 0x3b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x32, 0x30, 0xb, 0x65, 0x39, 0x64, 0x53, 0x30, 0x30, 0x0, 0x66, 0x66, 0x35, 0x63, 0x39]}, &(0x7f0000000140)={0x0, "12c0a0a7f6048b4e97b0c48ecb0fd5188d629e6e38ffde4ff8db3e75fbab33217dd92d603ca8591341bf4bcceb2bbd94665d1262b7d0cb12a6d7a5a67d9d2c76", 0x11}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:49 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:49 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:49 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000100)=r2) 07:43:49 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:49 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6858c78925797006b4908ee22f3d04e95f084dd23ada55774bb9493d8d0438dbc55b1b7fe82869e064bca6c6cc946e156fb4e30fce7694b57e218572e752cc71", 0x3b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x32, 0x30, 0xb, 0x65, 0x39, 0x64, 0x53, 0x30, 0x30, 0x0, 0x66, 0x66, 0x35, 0x63, 0x39]}, &(0x7f0000000140)={0x0, "12c0a0a7f6048b4e97b0c48ecb0fd5188d629e6e38ffde4ff8db3e75fbab33217dd92d603ca8591341bf4bcceb2bbd94665d1262b7d0cb12a6d7a5a67d9d2c76", 0x11}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:49 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:49 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:49 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6858c78925797006b4908ee22f3d04e95f084dd23ada55774bb9493d8d0438dbc55b1b7fe82869e064bca6c6cc946e156fb4e30fce7694b57e218572e752cc71", 0x3b}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x32, 0x30, 0xb, 0x65, 0x39, 0x64, 0x53, 0x30, 0x30, 0x0, 0x66, 0x66, 0x35, 0x63, 0x39]}, &(0x7f0000000140)={0x0, "12c0a0a7f6048b4e97b0c48ecb0fd5188d629e6e38ffde4ff8db3e75fbab33217dd92d603ca8591341bf4bcceb2bbd94665d1262b7d0cb12a6d7a5a67d9d2c76", 0x11}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6858c78925797006b4908ee22f3d04e95f084dd23ada55774bb9493d8d0438dbc55b1b7fe82869e064bca6c6cc946e156fb4e30fce7694b57e218572e752cc71", 0x3b}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x32, 0x30, 0xb, 0x65, 0x39, 0x64, 0x53, 0x30, 0x30, 0x0, 0x66, 0x66, 0x35, 0x63, 0x39]}, &(0x7f0000000140)={0x0, "12c0a0a7f6048b4e97b0c48ecb0fd5188d629e6e38ffde4ff8db3e75fbab33217dd92d603ca8591341bf4bcceb2bbd94665d1262b7d0cb12a6d7a5a67d9d2c76", 0x11}, 0x48, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) 07:43:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:49 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000100)=r2) 07:43:49 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:50 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:50 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000100)=r2) 07:43:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:50 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:50 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:50 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) 07:43:50 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:50 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:50 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:50 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) 07:43:51 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, 0x0) 07:43:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:51 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) (async) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x3d}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe23, 0xfffffffffffffffa) 07:43:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0x6, 0x4) 07:43:51 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x3d}, 0x48, 0xfffffffffffffffb) (rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe23, 0xfffffffffffffffa) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:51 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0x6, 0x4) 07:43:51 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) (rerun: 32) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x3d}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffe23, 0xfffffffffffffffa) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 4: r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@netrom, @null, @remote, @default, @bcast, @rose, @default, @netrom]}, &(0x7f0000000140)=0x48) 07:43:51 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0x6, 0x4) 07:43:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:51 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:51 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:52 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:52 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@netrom, @null, @remote, @default, @bcast, @rose, @default, @netrom]}, &(0x7f0000000140)=0x48) 07:43:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}]}, 0x24}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), 0x0, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:52 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@netrom, @null, @remote, @default, @bcast, @rose, @default, @netrom]}, &(0x7f0000000140)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@netrom, @null, @remote, @default, @bcast, @rose, @default, @netrom]}, &(0x7f0000000140)=0x48) (async) 07:43:52 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:52 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:53 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:53 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x62, 0x33, 0x32, 0x32, 0x411fe4dbecfa61eb, 0x37, 0x63, 0x66, 0x36, 0x39, 0x37, 0x32, 0xa9, 0x34, 0x62, 0x37]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x20}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:43:53 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:53 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x62, 0x33, 0x32, 0x32, 0x411fe4dbecfa61eb, 0x37, 0x63, 0x66, 0x36, 0x39, 0x37, 0x32, 0xa9, 0x34, 0x62, 0x37]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x20}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x109040, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:53 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:53 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x8000) 07:43:53 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x62, 0x33, 0x32, 0x32, 0x411fe4dbecfa61eb, 0x37, 0x63, 0x66, 0x36, 0x39, 0x37, 0x32, 0xa9, 0x34, 0x62, 0x37]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x20}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:43:54 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:54 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x109040, 0x0) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:54 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:54 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x0, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 07:43:54 executing program 0: ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000080)={0x0, 0x83, 0xa7, 0x40, 0x4, 0xa, 0x22, "b79a460f09aa9eda935a7f6c189042b8e8f0f74e", "829aac253bf439a5ba6acc0df4d4188781d88155"}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) sendto$x25(r1, &(0x7f0000000380)="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", 0x1000, 0x1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x28002, 0x0) getpeername$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@null, @null, @default, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000200)=0x48) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000001c0)=r3) 07:43:54 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:54 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x0, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:54 executing program 0: ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000080)={0x0, 0x83, 0xa7, 0x40, 0x4, 0xa, 0x22, "b79a460f09aa9eda935a7f6c189042b8e8f0f74e", "829aac253bf439a5ba6acc0df4d4188781d88155"}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) sendto$x25(r1, &(0x7f0000000380)="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", 0x1000, 0x1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x28002, 0x0) getpeername$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@null, @null, @default, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000200)=0x48) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000001c0)=r3) 07:43:54 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:54 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x0, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:54 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x109040, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x109040, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:43:55 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:55 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getpgrp(0x0) r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:55 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:55 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:43:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x0, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:55 executing program 0: ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000080)={0x0, 0x83, 0xa7, 0x40, 0x4, 0xa, 0x22, "b79a460f09aa9eda935a7f6c189042b8e8f0f74e", "829aac253bf439a5ba6acc0df4d4188781d88155"}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) sendto$x25(r1, &(0x7f0000000380)="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", 0x1000, 0x1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x28002, 0x0) getpeername$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@null, @null, @default, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000200)=0x48) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000001c0)=r3) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000080)={0x0, 0x83, 0xa7, 0x40, 0x4, 0xa, 0x22, "b79a460f09aa9eda935a7f6c189042b8e8f0f74e", "829aac253bf439a5ba6acc0df4d4188781d88155"}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) (async) sendto$x25(r1, &(0x7f0000000380)="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", 0x1000, 0x1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x28002, 0x0) (async) getpeername$netrom(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@null, @null, @default, @bcast, @rose, @netrom, @remote, @default]}, &(0x7f0000000200)=0x48) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000001c0)=r3) (async) 07:43:55 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) 07:43:55 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) getpgrp(0x0) (async) r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:55 executing program 0: getsockname$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @default, @null, @rose, @netrom]}, &(0x7f00000000c0)=0x48) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x35, 0x30, 0x61, 0x65, 0x32, 0x32, 0x35, 0x33, 0x37, 0x63, 0x32, 0x30, 0x36, 0x61, 0x33, 0x31]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083121be4e0db969cbffd07e54b8a3b55aeeda9bf2f106eb5250a5e31f9e554f4c4ed0063531357011d57d2ef3bdc48c9000000fcffffff00"}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:55 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getpgrp(0x0) r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) getpgrp(0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) (async) 07:43:55 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:55 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x0, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:56 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000040)={0x1, 0x3, "b20514", 0x3, 0x7}) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:56 executing program 0: getsockname$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @default, @null, @rose, @netrom]}, &(0x7f00000000c0)=0x48) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x35, 0x30, 0x61, 0x65, 0x32, 0x32, 0x35, 0x33, 0x37, 0x63, 0x32, 0x30, 0x36, 0x61, 0x33, 0x31]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083121be4e0db969cbffd07e54b8a3b55aeeda9bf2f106eb5250a5e31f9e554f4c4ed0063531357011d57d2ef3bdc48c9000000fcffffff00"}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x0, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x0, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:56 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000040)={0x1, 0x3, "b20514", 0x3, 0x7}) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x0, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:56 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:57 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x0, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:57 executing program 0: getsockname$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@netrom, @rose, @default, @null, @rose, @netrom]}, &(0x7f00000000c0)=0x48) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x35, 0x30, 0x61, 0x65, 0x32, 0x32, 0x35, 0x33, 0x37, 0x63, 0x32, 0x30, 0x36, 0x61, 0x33, 0x31]}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083121be4e0db969cbffd07e54b8a3b55aeeda9bf2f106eb5250a5e31f9e554f4c4ed0063531357011d57d2ef3bdc48c9000000fcffffff00"}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:57 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000040)={0x1, 0x3, "b20514", 0x3, 0x7}) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:43:57 executing program 3: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:43:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:57 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:57 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x0, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:57 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:57 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:57 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:58 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:58 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x0, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:58 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:58 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:43:58 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:43:58 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) (async) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000480)={0x4, 0x1000, "47e847", 0xff, 0x8}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000380)=""/163, &(0x7f0000000440)=0xa3) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "4d7fbf1b3717ea66dc41dc4d808d68044a5ffbcac8253bbe5b489093f51c03840c9aa1e78ad9691a83fd05e2793b0665a2c6b98275063d7667f6107ae592a40d", 0x37}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffce, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockname$netrom(r5, 0x0, &(0x7f00000004c0)) recvfrom$x25(r3, &(0x7f00000002c0)=""/174, 0xae, 0x40000000, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 07:43:58 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x0, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:58 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:58 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000480)={0x4, 0x1000, "47e847", 0xff, 0x8}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000380)=""/163, &(0x7f0000000440)=0xa3) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "4d7fbf1b3717ea66dc41dc4d808d68044a5ffbcac8253bbe5b489093f51c03840c9aa1e78ad9691a83fd05e2793b0665a2c6b98275063d7667f6107ae592a40d", 0x37}, 0x48, r2) (async) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffce, r2) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) (async) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockname$netrom(r5, 0x0, &(0x7f00000004c0)) recvfrom$x25(r3, &(0x7f00000002c0)=""/174, 0xae, 0x40000000, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 07:43:58 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:59 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000040)) (async) geteuid() (async) write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) (async) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) (async) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) (async) 07:43:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x0, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:59 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:59 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000480)={0x4, 0x1000, "47e847", 0xff, 0x8}) (async, rerun: 32) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000380)=""/163, &(0x7f0000000440)=0xa3) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 32) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (rerun: 32) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "4d7fbf1b3717ea66dc41dc4d808d68044a5ffbcac8253bbe5b489093f51c03840c9aa1e78ad9691a83fd05e2793b0665a2c6b98275063d7667f6107ae592a40d", 0x37}, 0x48, r2) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffce, r2) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockname$netrom(r5, 0x0, &(0x7f00000004c0)) recvfrom$x25(r3, &(0x7f00000002c0)=""/174, 0xae, 0x40000000, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 07:43:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x0, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:59 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:43:59 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:43:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:59 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1, 0x2}, 0xffffffffffffff1a) 07:43:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x0, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:59 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async, rerun: 64) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) (async, rerun: 64) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) (async, rerun: 32) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) (rerun: 32) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) (async) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) (async) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:43:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:43:59 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:43:59 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1, 0x2}, 0xffffffffffffff1a) 07:43:59 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x0, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:43:59 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) (async) socket$bt_rfcomm(0x1f, 0x1, 0x3) (async) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) (async) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) (async) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) (async) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) (async) 07:43:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:00 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 07:44:00 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:00 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1, 0x2}, 0xffffffffffffff1a) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1, 0x2}, 0xffffffffffffff1a) (async) 07:44:00 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x2c}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x0, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:00 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:00 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x2c}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x0, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:00 executing program 2: process_vm_readv(0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/112, 0x70}], 0x2, &(0x7f0000001480)=[{&(0x7f0000000200)=""/193, 0xc1}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:00 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:00 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 32) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x2c}, 0x48, 0xfffffffffffffffb) (rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:00 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:00 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f00000020c0)={0x90, 0x0, 0x0, {0x3, 0x0, 0x9, 0xe3, 0xa13, 0x1f, {0x0, 0x13c923c9, 0x9, 0x325702d, 0x20, 0x2, 0x6, 0x5e, 0xd0000000, 0x4000, 0x2, r3, r4, 0x9, 0x80}}}, 0x90) 07:44:00 executing program 2: process_vm_readv(0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/112, 0x70}], 0x2, &(0x7f0000001480)=[{&(0x7f0000000200)=""/193, 0xc1}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) process_vm_readv(0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/112, 0x70}], 0x2, &(0x7f0000001480)=[{&(0x7f0000000200)=""/193, 0xc1}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:00 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123200, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xdf) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20600, 0x0) bind$vsock_dgram(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:00 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x0, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:01 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123200, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xdf) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20600, 0x0) bind$vsock_dgram(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123200, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xdf) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20600, 0x0) (async) bind$vsock_dgram(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:01 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x0, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:01 executing program 2: process_vm_readv(0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {&(0x7f0000000140)=""/112, 0x70}], 0x2, &(0x7f0000001480)=[{&(0x7f0000000200)=""/193, 0xc1}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, 0x0) (async, rerun: 32) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 32) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:01 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123200, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xdf) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20600, 0x0) bind$vsock_dgram(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x123200, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xdf) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x20600, 0x0) (async) bind$vsock_dgram(r3, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x0, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:01 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) geteuid() write$vhost_msg_v2(r1, &(0x7f0000003240)={0x2, 0x0, {&(0x7f0000002180)=""/4096, 0x1000, &(0x7f0000003180)=""/166, 0x2, 0x3}}, 0x48) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:01 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:01 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @default, @rose={'rose', 0x0}, 0x400, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:44:01 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$sock_bt_hci(r1, 0x400448de, &(0x7f0000000040)="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") bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:01 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 64) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (rerun: 64) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @default, @rose={'rose', 0x0}, 0x400, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async, rerun: 64) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:44:01 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$sock_bt_hci(r1, 0x400448de, &(0x7f0000000040)="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") (async, rerun: 64) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (rerun: 64) 07:44:01 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:01 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:02 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @default, @rose={'rose', 0x0}, 0x400, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:44:02 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, 0x0, 0x0) 07:44:02 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)) geteuid() read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:02 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$sock_bt_hci(r1, 0x400448de, &(0x7f0000000040)="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") bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$sock_bt_hci(r1, 0x400448de, &(0x7f0000000040)="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") (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:02 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:02 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, 0x0, 0x0) 07:44:02 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@null, 0xb, 'wlan0\x00'}) sendto$x25(0xffffffffffffffff, &(0x7f0000000080)="32a0a158be8978cf464146841340d7bc2cb133d5509fdd16df6fd20e495b930fd24953b4baf6c1f22554", 0x2a, 0x4, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0xc0201, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) syz_open_dev$sg(&(0x7f0000000180), 0xe728, 0x40000) 07:44:02 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:02 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@null, 0xb, 'wlan0\x00'}) sendto$x25(0xffffffffffffffff, &(0x7f0000000080)="32a0a158be8978cf464146841340d7bc2cb133d5509fdd16df6fd20e495b930fd24953b4baf6c1f22554", 0x2a, 0x4, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0xc0201, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) syz_open_dev$sg(&(0x7f0000000180), 0xe728, 0x40000) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@null, 0xb, 'wlan0\x00'}) (async) sendto$x25(0xffffffffffffffff, &(0x7f0000000080)="32a0a158be8978cf464146841340d7bc2cb133d5509fdd16df6fd20e495b930fd24953b4baf6c1f22554", 0x2a, 0x4, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0xc0201, 0x0) (async) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) (async) syz_open_dev$sg(&(0x7f0000000180), 0xe728, 0x40000) (async) 07:44:02 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, 0x0, 0x0) 07:44:02 executing program 2: pipe(&(0x7f00000013c0)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001300)={0x1f, 0x4}, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40841, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdbf) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000001340)={0x1, 0x2, "bbff9f", 0x9, 0x44}) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000001280)=@multiplanar_fd={0x7fffffff, 0x0, 0x4, 0x8, 0x20, {0x0, 0xea60}, {0x5, 0x2, 0x6, 0x0, 0x4, 0x0, "7d6025e5"}, 0x8001, 0x4, {&(0x7f0000001200)=[{0x8, 0x2800000, {r2}, 0x32af}, {0x101, 0x5, {r1}, 0x8}]}, 0x593, 0x0, r1}) pipe(&(0x7f0000001380)={0xffffffffffffffff}) recvmsg$can_bcm(r3, &(0x7f00000011c0)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0, 0xff20}, 0x40002003) 07:44:02 executing program 2: pipe(&(0x7f00000013c0)) (async, rerun: 64) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 64) bind$bt_hci(r0, &(0x7f0000001300)={0x1f, 0x4}, 0x6) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40841, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdbf) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000001340)={0x1, 0x2, "bbff9f", 0x9, 0x44}) (async) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000001280)=@multiplanar_fd={0x7fffffff, 0x0, 0x4, 0x8, 0x20, {0x0, 0xea60}, {0x5, 0x2, 0x6, 0x0, 0x4, 0x0, "7d6025e5"}, 0x8001, 0x4, {&(0x7f0000001200)=[{0x8, 0x2800000, {r2}, 0x32af}, {0x101, 0x5, {r1}, 0x8}]}, 0x593, 0x0, r1}) (async) pipe(&(0x7f0000001380)={0xffffffffffffffff}) recvmsg$can_bcm(r3, &(0x7f00000011c0)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0, 0xff20}, 0x40002003) 07:44:02 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@null, 0xb, 'wlan0\x00'}) (async) sendto$x25(0xffffffffffffffff, &(0x7f0000000080)="32a0a158be8978cf464146841340d7bc2cb133d5509fdd16df6fd20e495b930fd24953b4baf6c1f22554", 0x2a, 0x4, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0xc0201, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) (async) syz_open_dev$sg(&(0x7f0000000180), 0xe728, 0x40000) 07:44:03 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:03 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:03 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x4}, 0x6) 07:44:03 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) 07:44:03 executing program 2: pipe(&(0x7f00000013c0)) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001300)={0x1f, 0x4}, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40841, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdbf) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000001340)={0x1, 0x2, "bbff9f", 0x9, 0x44}) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000001280)=@multiplanar_fd={0x7fffffff, 0x0, 0x4, 0x8, 0x20, {0x0, 0xea60}, {0x5, 0x2, 0x6, 0x0, 0x4, 0x0, "7d6025e5"}, 0x8001, 0x4, {&(0x7f0000001200)=[{0x8, 0x2800000, {r2}, 0x32af}, {0x101, 0x5, {r1}, 0x8}]}, 0x593, 0x0, r1}) pipe(&(0x7f0000001380)={0xffffffffffffffff}) recvmsg$can_bcm(r3, &(0x7f00000011c0)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0, 0xff20}, 0x40002003) pipe(&(0x7f00000013c0)) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000001300)={0x1f, 0x4}, 0x6) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40841, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffdbf) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000001340)={0x1, 0x2, "bbff9f", 0x9, 0x44}) (async) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000001280)=@multiplanar_fd={0x7fffffff, 0x0, 0x4, 0x8, 0x20, {0x0, 0xea60}, {0x5, 0x2, 0x6, 0x0, 0x4, 0x0, "7d6025e5"}, 0x8001, 0x4, {&(0x7f0000001200)=[{0x8, 0x2800000, {r2}, 0x32af}, {0x101, 0x5, {r1}, 0x8}]}, 0x593, 0x0, r1}) (async) pipe(&(0x7f0000001380)) (async) recvmsg$can_bcm(r3, &(0x7f00000011c0)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, 0x0, 0xff20}, 0x40002003) (async) 07:44:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:03 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, &(0x7f0000000040), 0x6) 07:44:03 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:03 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) (async) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) (async) 07:44:03 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x4}, 0x6) 07:44:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) 07:44:04 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:04 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x4}, 0x6) 07:44:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) syz_open_dev$sg(&(0x7f00000003c0), 0x7, 0x20a00) (async) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x38, 0x34, 0x64, 0x66, 0x37, 0x33, 0x66, 0x64, 0x34, 0x38, 0x39, 0x35, 0x38, 0x38, 0x50, 0x65]}, &(0x7f00000002c0)={0x0, "376820ca6b8a50c5b3a2350212a8f61d2bda1d124008cbd71a72e8b6d336572cff85c4e1a30cff77bcdc873d4e3aadfbfa7bbb8670784286c6a17583b40924dd", 0x10000}, 0x48, r2) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "539b8d0b14e7fe9f8b1d14a4fc18d12f61120205ecad89122995b50eb979f193f1e5a93ec44956b17e3d52a44dee7f8cb1293a7f15981178dc29e483cfb6eb58", 0x22}, 0x48, 0xfffffffffffffffd) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x17) (async) 07:44:04 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:04 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@null, 0xb, 'wlan0\x00'}) sendto$x25(0xffffffffffffffff, &(0x7f0000000080)="32a0a158be8978cf464146841340d7bc2cb133d5509fdd16df6fd20e495b930fd24953b4baf6c1f22554", 0x2a, 0x4, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000140), 0xc0201, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) syz_open_dev$sg(&(0x7f0000000180), 0xe728, 0x40000) 07:44:04 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) 07:44:04 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x101, 0x4) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) socket$bt_bnep(0x1f, 0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:04 executing program 4: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:44:04 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x4}, 0x6) 07:44:04 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x0, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:04 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x101, 0x4) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:05 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:05 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:05 executing program 4: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:44:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x3}, 0x6) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x2, 0x4}, 0x6) 07:44:05 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x101, 0x4) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:05 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x20, 0xca, 0x6, 0x5, 0xa167}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:05 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x0, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:05 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839fc57010d57d2ef3bdc48c900"}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "707abcbf3f2b61259b08a3ccbead51198701a125c7a6d9266774dd9d3c6cba8a6b12016f9ecf43400b779b86e4da09a9aa7c37265e26a274c21ff24d9000b285", 0x1c}, 0x48, 0xfffffffffffffff8) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "b7a648cc8ede60b25ab0ba3f99e97e7ca278078585361fabbde262410a1409196ddfbd1e406efd2524ea057624fbc6f82bad2bef48db6d52b70e37fcca3ac81c", 0xc1}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) socket$nl_crypto(0x10, 0x3, 0x15) 07:44:05 executing program 4: add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:44:05 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:05 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) (async, rerun: 64) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async, rerun: 64) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x20, 0xca, 0x6, 0x5, 0xa167}) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async, rerun: 32) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) (async, rerun: 32) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) (async) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:05 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x20, 0xca, 0x6, 0x5, 0xa167}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:05 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:05 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:05 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839fc57010d57d2ef3bdc48c900"}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "707abcbf3f2b61259b08a3ccbead51198701a125c7a6d9266774dd9d3c6cba8a6b12016f9ecf43400b779b86e4da09a9aa7c37265e26a274c21ff24d9000b285", 0x1c}, 0x48, 0xfffffffffffffff8) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "b7a648cc8ede60b25ab0ba3f99e97e7ca278078585361fabbde262410a1409196ddfbd1e406efd2524ea057624fbc6f82bad2bef48db6d52b70e37fcca3ac81c", 0xc1}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) socket$nl_crypto(0x10, 0x3, 0x15) 07:44:05 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:05 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x20, 0xca, 0x6, 0x5, 0xa167}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x20, 0xca, 0x6, 0x5, 0xa167}) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) (async) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:05 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:05 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:05 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:05 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x80000001, [0x49, 0xc97c], 0x2}, 0x10) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:06 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:06 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000800)) 07:44:06 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x80000001, [0x49, 0xc97c], 0x2}, 0x10) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:06 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:06 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000780), 0x0) 07:44:06 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839fc57010d57d2ef3bdc48c900"}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "707abcbf3f2b61259b08a3ccbead51198701a125c7a6d9266774dd9d3c6cba8a6b12016f9ecf43400b779b86e4da09a9aa7c37265e26a274c21ff24d9000b285", 0x1c}, 0x48, 0xfffffffffffffff8) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "b7a648cc8ede60b25ab0ba3f99e97e7ca278078585361fabbde262410a1409196ddfbd1e406efd2524ea057624fbc6f82bad2bef48db6d52b70e37fcca3ac81c", 0xc1}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) socket$nl_crypto(0x10, 0x3, 0x15) 07:44:06 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:06 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r1) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:06 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:06 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xc3) 07:44:06 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) 07:44:06 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020}, 0x2020) 07:44:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x80000001, [0x49, 0xc97c], 0x2}, 0x10) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) (async) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x80000001, [0x49, 0xc97c], 0x2}, 0x10) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:07 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:07 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xc3) 07:44:07 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) 07:44:07 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:07 executing program 2: getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000100)=0xe1, &(0x7f0000000140)=0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x8, 0x4) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, @any, 0xe0}, 0xa) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x80, 0x3}, 0x6) 07:44:07 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) add_key$fscrypt_v1(&(0x7f0000000700), &(0x7f0000000740)={'fscrypt:', @desc2}, &(0x7f0000000780)={0x0, "eab80756b5bfd092042ca3d5f5727298be3376b0d5c894771a348ea9e6bfc78cd8d7a0b565901723579c43505fc3b4cb8143804619944b5f59824ac7dd64b4fb", 0x19}, 0x48, 0xfffffffffffffffa) 07:44:07 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000600), 0x600240, 0x0) 07:44:07 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r2 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, 0xffffffffffffffff, 0xc3) 07:44:07 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:07 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:07 executing program 2: getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000100)=0xe1, &(0x7f0000000140)=0x4) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x8, 0x4) (async, rerun: 64) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, @any, 0xe0}, 0xa) (async, rerun: 64) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x80, 0x3}, 0x6) 07:44:07 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 07:44:08 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:08 executing program 0: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:08 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:08 executing program 2: getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000100)=0xe1, &(0x7f0000000140)=0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x8, 0x4) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, @any, 0xe0}, 0xa) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x80, 0x3}, 0x6) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000100)=0xe1, &(0x7f0000000140)=0x4) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f00000000c0)=0x8, 0x4) (async) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, @any, 0xe0}, 0xa) (async) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x80, 0x3}, 0x6) (async) 07:44:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:44:08 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:08 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(r0, 0x0, 0x0) 07:44:08 executing program 0: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) (async, rerun: 32) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (rerun: 32) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:08 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000040), 0x12) 07:44:09 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:09 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:09 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:09 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000040), 0x12) 07:44:09 executing program 0: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000040), 0x12) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) bind$x25(r1, &(0x7f0000000040), 0x12) (async) 07:44:09 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:09 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:09 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:09 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0xe, 0x6, 0xf, 0x7, 0xe, 0x81}) 07:44:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x22a00, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x80, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:10 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:10 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0xe, 0x6, 0xf, 0x7, 0xe, 0x81}) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x0) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0xe, 0x6, 0xf, 0x7, 0xe, 0x81}) (async) 07:44:10 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:10 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:10 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x22a00, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x80, 0x4) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:10 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) socket$bt_rfcomm(0x1f, 0x1, 0x3) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:10 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x22a00, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x80, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x22a00, 0x0) (async) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x80, 0x4) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:10 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) 07:44:10 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0xe, 0x6, 0xf, 0x7, 0xe, 0x81}) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x0) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0xe, 0x6, 0xf, 0x7, 0xe, 0x81}) (async) 07:44:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 07:44:10 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:10 executing program 2: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d08bd3a5b6802a1f0b002901000500000004000000000500000000001f0000000000000000002007002e"], 0x2a) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:10 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x22a00, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000000c0)=0x80, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:11 executing program 0: ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001500)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0xd, 'wg1\x00'}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) process_vm_readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000200)=""/34, 0x22}, {&(0x7f0000001380)=""/28, 0x1c}], 0x4, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:11 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) r1 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x65, 0x64, 0x62, 0x38, 0x63, 0x64, 0x64, 0x31, 0x38, 0x30, 0x37, 0x65, 0xa4, 0x62, 0x0, 0x63]}, &(0x7f0000000140)={0x0, "efeeff8338f916e6e498979d8b484a4cfd8ad06a92190bd3dfc637e55eee378b5c044ebd0294014bbb4660a7ba076c80af57446ea84bce10e09424407dd4fb0a", 0x40}, 0x48, r1) 07:44:11 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:11 executing program 2: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d08bd3a5b6802a1f0b002901000500000004000000000500000000001f0000000000000000002007002e"], 0x2a) (async, rerun: 64) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 64) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:11 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:11 executing program 5: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d08bd3a5b6802a1f0b002901000500000004000000000500000000001f0000000000000000002007002e"], 0x2a) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:11 executing program 0: ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001500)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0xd, 'wg1\x00'}) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) process_vm_readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000200)=""/34, 0x22}, {&(0x7f0000001380)=""/28, 0x1c}], 0x4, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:11 executing program 5: ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001500)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0xd, 'wg1\x00'}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) process_vm_readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000200)=""/34, 0x22}, {&(0x7f0000001380)=""/28, 0x1c}], 0x4, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:11 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:11 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 07:44:11 executing program 0: ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001500)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0xd, 'wg1\x00'}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) process_vm_readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000200)=""/34, 0x22}, {&(0x7f0000001380)=""/28, 0x1c}], 0x4, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:11 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:11 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:11 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC=r0, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:11 executing program 2: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d08bd3a5b6802a1f0b002901000500000004000000000500000000001f0000000000000000002007002e"], 0x2a) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d08bd3a5b6802a1f0b002901000500000004000000000500000000001f0000000000000000002007002e"], 0x2a) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:12 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:12 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$nl_generic(0x10, 0x3, 0x10) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0xffffff01, 0x4) 07:44:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0xffffff01, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe(&(0x7f00000000c0)) (async) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0xffffff01, 0x4) (async) 07:44:12 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async, rerun: 32) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:12 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0xffffff01, 0x4) 07:44:13 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:13 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:13 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:13 executing program 3: getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:13 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x28000, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2}, 0x3) 07:44:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2}, 0x3) 07:44:13 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) 07:44:13 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:13 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000200)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000380)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "f642d056d97f6b4ea39e42034082276daf04834f5f0bbbb1ed11f184a3b41486cba6725ef9494154d7ac858ef59166e3b9533729f48974a2d3bceb3133b13a03", 0x3b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "4641c4acbb05081b42f93f0691a6f27f2745e36be7d320da8192ca9ce9a256810b82abbf0cb48383dcf59758b356db3df3e7de70bb1928296631551db9a42577", 0x1d}, 0x48, r2) 07:44:13 executing program 3: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 64) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async, rerun: 32) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2}, 0x3) (rerun: 32) 07:44:14 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:14 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000200)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000380)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "f642d056d97f6b4ea39e42034082276daf04834f5f0bbbb1ed11f184a3b41486cba6725ef9494154d7ac858ef59166e3b9533729f48974a2d3bceb3133b13a03", 0x3b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "4641c4acbb05081b42f93f0691a6f27f2745e36be7d320da8192ca9ce9a256810b82abbf0cb48383dcf59758b356db3df3e7de70bb1928296631551db9a42577", 0x1d}, 0x48, r2) 07:44:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:14 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) socket$nl_generic(0x10, 0x3, 0x10) 07:44:14 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) socket$nl_generic(0x10, 0x3, 0x10) 07:44:14 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:14 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000200)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000380)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "f642d056d97f6b4ea39e42034082276daf04834f5f0bbbb1ed11f184a3b41486cba6725ef9494154d7ac858ef59166e3b9533729f48974a2d3bceb3133b13a03", 0x3b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "4641c4acbb05081b42f93f0691a6f27f2745e36be7d320da8192ca9ce9a256810b82abbf0cb48383dcf59758b356db3df3e7de70bb1928296631551db9a42577", 0x1d}, 0x48, r2) 07:44:14 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) 07:44:14 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:14 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:14 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:14 executing program 2: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x2, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000080)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:14 executing program 4: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) write$bt_hci(r1, &(0x7f0000000080)={0x1, @write_current_iac_lap={{0xc3a, 0x7}, {0x6, "e6e3287ecf03"}}}, 0xb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC, @ANYBLOB=',~6+\b\x00_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d3078da3030303030303030303030303030302c66736d616769633d3078303030303030303030303030303030302c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:14 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:14 executing program 4: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:14 executing program 2: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x2, 0x4) (async, rerun: 64) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 64) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000080)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:15 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:15 executing program 4: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:15 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:15 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) write$bt_hci(r1, &(0x7f0000000080)={0x1, @write_current_iac_lap={{0xc3a, 0x7}, {0x6, "e6e3287ecf03"}}}, 0xb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) write$bt_hci(r1, &(0x7f0000000080)={0x1, @write_current_iac_lap={{0xc3a, 0x7}, {0x6, "e6e3287ecf03"}}}, 0xb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:15 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:15 executing program 5: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:15 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:15 executing program 2: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x2, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000080)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:15 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 32) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) write$bt_hci(r1, &(0x7f0000000080)={0x1, @write_current_iac_lap={{0xc3a, 0x7}, {0x6, "e6e3287ecf03"}}}, 0xb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:15 executing program 5: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:15 executing program 2: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000040)={"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"}) getitimer(0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000440)={0x5, 0x0, [{}, {}, {}, {}, {}]}) 07:44:15 executing program 5: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:15 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:15 executing program 2: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000040)={"213ac2c68c90a810a2e46641106d02a7b9c2c1a2bb2f6a9982a5c68c2fc7cd89d564a9c153f8ae35dcbb04de120981d2c12869e67b3ddd9a1c5f7d93ff54017fb3bf01df33d8a43e61ec708cd9074909fbdd8626bdcdb19d5e93af9ddf5a9cbe46e0d53b585e16c90ff1e992352b5260a938453011b9dbec09c58327e74ee54b1a9100316e654459249f611eae38fafcf935e849b9846f183b39789b344ffda4d5d59b4e2ef55a45188778c00eef75bbbbb6eef69d1f685916bf2ae6bb0302681375c5f62e8d23bf5c677a5cacd2cd74a1edf8661c588167c952caebf3c7e915023f3b8aecd04493569a321e460138d5d4678a62924ecc6fbb8acfad9e5573415e490fe522be14869174f6dc01a47b4c322ad5fb459ba07299e71d89328e91a636f80f33e1c2b0e0f06499ccc4b764e5b9c04e0abcb2f6994bae600f53b3b17d3535060dac4c6a7766839510d4d8722c557144e408d9aacba632b2dec410a28089503b8bc157f68fc933407ebff8c8bc8d0555b2fb93f50b78fc31ba5e540c1e0b5c854e7e6eafba36a9972b08e4aff7bef6f53b4068f05e6a3862ce12286140d2b9981f8b768bc4ce597b9c520b5f5502f38a101bef5089b644bfff7fccc8c3e9d7484fca77d21f93205881a8621f09db3446b8147ff2897c4a514992b98f4beea52c8411ce646d92bbe184f3d798557db7405a096803c4283cada531c1323f252fbd1d4517829e3e626338781f1cbbcbb7d7cfd988b3f5ccc137ac97b029ccc40a6798041c5baf7c635ef23edf3379ea79ddf358c2ca63b01a9fe50778016105c227a3b796fadcc68512fd7c72545b512eddebaa032eb919f0edffd39c8693671838d074b1e94cb00c73c34cc6b75b424bf3f6ba2bf1793490c070458d829d2136c6a8aaa9c8d1c77ddb44c3df26cd467442018b5c08cc19b43c97800a6362b7c0d62913e5a7514bdbc43bd65c315d1d59e055ec3d14e9577df65af6eec9a535d82ee26f31b95f7a9fd6f52bd12c72fb2e085a09a664dbe5174840d08eae399bdb65b51d58d91629de69ff818cb68881d6eee60880e69fa60b5615d4f07b6d2a18066f5063ae1c4ca0fdbb94a77deef514265a3dad71995e68481e3b7b87303090ae065cfd470f5d471ee37f6424cbb9bd7084f085842501474e51ba28f536b82503cac49d5620fde238e6e73f4dd5c98f25baf28405b6679632b053efb3b2a46013ffa9be8ac02d10cdeea44fe9b9be3c147e6b14238234ce96a551dd6cee53527ed4b96b0ce1ddce5d8428a9733b5d7040825ba1431480288d2ef8755d5c024d82ee4df5d46e4fafc5116ff237b9d4fba4df02beb04d83feb9894c78dcbbae58e4a1ade2ccde1d98fbb653beab57aa8b8a2a75643d325bac59344a37f037ce807d87c8b9609a857d4350247f866d309116a61e0eb7434e8bad7b28e3cc89"}) (async) getitimer(0x0, 0x0) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async, rerun: 64) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000440)={0x5, 0x0, [{}, {}, {}, {}, {}]}) (rerun: 64) 07:44:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:16 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:16 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:16 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:16 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:16 executing program 2: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000040)={"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"}) getitimer(0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000440)={0x5, 0x0, [{}, {}, {}, {}, {}]}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000040)={"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"}) (async) getitimer(0x0, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000440)={0x5, 0x0, [{}, {}, {}, {}, {}]}) (async) 07:44:16 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:16 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:16 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:16 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:16 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:17 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:17 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffff9) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:17 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2, 0x3}, 0x6) 07:44:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:17 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:17 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:17 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:17 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xd9, 0xaf, 0x1f, 0x0, 0x677f, 0x2, 0x80, 0x4, 0x20, 0xff, 0x6, 0x8, 0x0, 0x7fffffff, 0x1, 0x2, 0x2, 0xff, 0xd5, '\x00', 0x8e, 0x8000000000000001}) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = geteuid() r2 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b184042fb313691", @ANYRES64=0x0, @ANYBLOB="03000000000000000000000000000000ff07000000000000ffff00000000000003000000fdffffff0100000000000000070000000000000005000000000000000600000000000000ef8300000000000001000000000000000400000000000100bd00000000c0000009000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="000000000700000000000000040000000000000000000000000600"/36], 0xa8) 07:44:17 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2, 0x3}, 0x6) 07:44:17 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(0x0, &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:18 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:18 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xd9, 0xaf, 0x1f, 0x0, 0x677f, 0x2, 0x80, 0x4, 0x20, 0xff, 0x6, 0x8, 0x0, 0x7fffffff, 0x1, 0x2, 0x2, 0xff, 0xd5, '\x00', 0x8e, 0x8000000000000001}) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async, rerun: 64) r1 = geteuid() (rerun: 64) r2 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b184042fb313691", @ANYRES64=0x0, @ANYBLOB="03000000000000000000000000000000ff07000000000000ffff00000000000003000000fdffffff0100000000000000070000000000000005000000000000000600000000000000ef8300000000000001000000000000000400000000000100bd00000000c0000009000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="000000000700000000000000040000000000000000000000000600"/36], 0xa8) 07:44:18 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:18 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:18 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2, 0x3}, 0x6) 07:44:18 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:18 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x107, 0x1b862f55, {r3, r4/1000+10000}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x29, 0x0, 0x0, 0x0, "6cfebe6253fdfe122749ffb611d6bb3bc751d0c9b19e65f5af3ec88834147bfe267114e1f7b9229f83c695109374e285451770fb9a808629d05bd59192967b54"}}, 0x80}, 0x1, 0x0, 0x0, 0x22000094}, 0x20000080) 07:44:18 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:18 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:18 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xffffffffffffffff) 07:44:18 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xd9, 0xaf, 0x1f, 0x0, 0x677f, 0x2, 0x80, 0x4, 0x20, 0xff, 0x6, 0x8, 0x0, 0x7fffffff, 0x1, 0x2, 0x2, 0xff, 0xd5, '\x00', 0x8e, 0x8000000000000001}) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = geteuid() r2 = getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b184042fb313691", @ANYRES64=0x0, @ANYBLOB="03000000000000000000000000000000ff07000000000000ffff00000000000003000000fdffffff0100000000000000070000000000000005000000000000000600000000000000ef8300000000000001000000000000000400000000000100bd00000000c0000009000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="000000000700000000000000040000000000000000000000000600"/36], 0xa8) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000080)={0xd9, 0xaf, 0x1f, 0x0, 0x677f, 0x2, 0x80, 0x4, 0x20, 0xff, 0x6, 0x8, 0x0, 0x7fffffff, 0x1, 0x2, 0x2, 0xff, 0xd5, '\x00', 0x8e, 0x8000000000000001}) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, 0xffffffffffffffff, 0x10) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) geteuid() (async) getegid() (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="1b184042fb313691", @ANYRES64=0x0, @ANYBLOB="03000000000000000000000000000000ff07000000000000ffff00000000000003000000fdffffff0100000000000000070000000000000005000000000000000600000000000000ef8300000000000001000000000000000400000000000100bd00000000c0000009000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="000000000700000000000000040000000000000000000000000600"/36], 0xa8) (async) 07:44:18 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:19 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x107, 0x1b862f55, {r3, r4/1000+10000}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x29, 0x0, 0x0, 0x0, "6cfebe6253fdfe122749ffb611d6bb3bc751d0c9b19e65f5af3ec88834147bfe267114e1f7b9229f83c695109374e285451770fb9a808629d05bd59192967b54"}}, 0x80}, 0x1, 0x0, 0x0, 0x22000094}, 0x20000080) 07:44:19 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xffffffffffffffff) 07:44:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:19 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:19 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5e) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:19 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xffffffffffffffff) 07:44:19 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:19 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x107, 0x1b862f55, {r3, r4/1000+10000}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x29, 0x0, 0x0, 0x0, "6cfebe6253fdfe122749ffb611d6bb3bc751d0c9b19e65f5af3ec88834147bfe267114e1f7b9229f83c695109374e285451770fb9a808629d05bd59192967b54"}}, 0x80}, 0x1, 0x0, 0x0, 0x22000094}, 0x20000080) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) clock_gettime(0x0, &(0x7f00000000c0)) (async) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x107, 0x1b862f55, {r3, r4/1000+10000}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x29, 0x0, 0x0, 0x0, "6cfebe6253fdfe122749ffb611d6bb3bc751d0c9b19e65f5af3ec88834147bfe267114e1f7b9229f83c695109374e285451770fb9a808629d05bd59192967b54"}}, 0x80}, 0x1, 0x0, 0x0, 0x22000094}, 0x20000080) (async) 07:44:19 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5e) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:19 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500"}, 0x48, 0xffffffffffffffff) 07:44:20 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:20 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5e) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5e) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:20 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:20 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, 0x0, 0x0, 0xffffffffffffffff) 07:44:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x3f, 0xfffffffd, 0x5, 0x4, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xb}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x391660, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000100)='GPL\x00', 0x101, 0x53, &(0x7f0000000140)=""/83, 0x41000, 0x6, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xa, 0x25, 0x1a06}, 0x10, 0x299ce, r1, 0x0, &(0x7f0000000280)=[r0, r0, r2, r0, r0, r3]}, 0x80) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000340)={0x1f, 0x8003}, 0x6) 07:44:20 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:20 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:20 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:44:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x3f, 0xfffffffd, 0x5, 0x4, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xb}, 0x48) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x391660, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000100)='GPL\x00', 0x101, 0x53, &(0x7f0000000140)=""/83, 0x41000, 0x6, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xa, 0x25, 0x1a06}, 0x10, 0x299ce, r1, 0x0, &(0x7f0000000280)=[r0, r0, r2, r0, r0, r3]}, 0x80) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000340)={0x1f, 0x8003}, 0x6) 07:44:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:20 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:21 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:21 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:44:21 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x3f, 0xfffffffd, 0x5, 0x4, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xb}, 0x48) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x391660, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000100)='GPL\x00', 0x101, 0x53, &(0x7f0000000140)=""/83, 0x41000, 0x6, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xa, 0x25, 0x1a06}, 0x10, 0x299ce, r1, 0x0, &(0x7f0000000280)=[r0, r0, r2, r0, r0, r3]}, 0x80) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000340)={0x1f, 0x8003}, 0x6) 07:44:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:21 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:21 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "1d3a2c495f51ed8efd17c8cab09036ff042648b1eef92a0d5fc807d09e7d723001dc8560e6c5ab6005c6a73c41b5602503fe19f7ef451805d55f19f67696ec86", 0x3e}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) 07:44:21 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r0) 07:44:21 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x3f, 0xfffffffd, 0x5, 0x4, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xb}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x391660, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x401}]}, &(0x7f0000000100)='GPL\x00', 0x101, 0x53, &(0x7f0000000140)=""/83, 0x41000, 0x6, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xa, 0x25, 0x1a06}, 0x10, 0x299ce, r1, 0x0, &(0x7f0000000280)=[r0, r0, r2, r0, r0, r3]}, 0x80) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000340)={0x1f, 0x8003}, 0x6) 07:44:21 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "1d3a2c495f51ed8efd17c8cab09036ff042648b1eef92a0d5fc807d09e7d723001dc8560e6c5ab6005c6a73c41b5602503fe19f7ef451805d55f19f67696ec86", 0x3e}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "1d3a2c495f51ed8efd17c8cab09036ff042648b1eef92a0d5fc807d09e7d723001dc8560e6c5ab6005c6a73c41b5602503fe19f7ef451805d55f19f67696ec86", 0x3e}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) (async) 07:44:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:22 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:22 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:22 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:22 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:22 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "1d3a2c495f51ed8efd17c8cab09036ff042648b1eef92a0d5fc807d09e7d723001dc8560e6c5ab6005c6a73c41b5602503fe19f7ef451805d55f19f67696ec86", 0x3e}, 0x48, 0xfffffffffffffffa) add_key$fscrypt_v1(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) 07:44:22 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:22 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) 07:44:22 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe2$9p(&(0x7f0000000080), 0x0) 07:44:22 executing program 2: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$vim2m_VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000040)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:22 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:22 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:22 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:22 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe2$9p(&(0x7f0000000080), 0x0) 07:44:22 executing program 2: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$vim2m_VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000040)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) socket$bt_bnep(0x1f, 0x3, 0x4) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$vim2m_VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000040)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:22 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) 07:44:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:22 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe2$9p(&(0x7f0000000080), 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe2$9p(&(0x7f0000000080), 0x0) (async) 07:44:23 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x107, 0x1b862f55, {r3, r4/1000+10000}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @canfd={{}, 0x29, 0x0, 0x0, 0x0, "6cfebe6253fdfe122749ffb611d6bb3bc751d0c9b19e65f5af3ec88834147bfe267114e1f7b9229f83c695109374e285451770fb9a808629d05bd59192967b54"}}, 0x80}, 0x1, 0x0, 0x0, 0x22000094}, 0x20000080) 07:44:23 executing program 2: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$vim2m_VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000040)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:23 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:23 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:23 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:23 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), 0x0, &(0x7f00000002c0), 0x800000, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:23 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept4$x25(r1, &(0x7f0000000100)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 07:44:23 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:23 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept4$x25(r1, &(0x7f0000000100)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 07:44:23 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:23 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:24 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:24 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:24 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept4$x25(r1, &(0x7f0000000100)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000140)=0x2) 07:44:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:24 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:24 executing program 5: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) 07:44:24 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:24 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:24 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000140)={0x1000, [0x8, 0xfffffffc], 0x1}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) recvfrom$x25(r1, &(0x7f0000000040)=""/202, 0xca, 0x40000100, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:24 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:25 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:25 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 32) getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) (rerun: 32) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000140)={0x1000, [0x8, 0xfffffffc], 0x1}, 0x10) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) recvfrom$x25(r1, &(0x7f0000000040)=""/202, 0xca, 0x40000100, 0x0, 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:25 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:25 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:25 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) (async) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000140)={0x1000, [0x8, 0xfffffffc], 0x1}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) recvfrom$x25(r1, &(0x7f0000000040)=""/202, 0xca, 0x40000100, 0x0, 0x0) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:25 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:25 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:25 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:25 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="a8000000daffffff", @ANYRES64=0x0, @ANYBLOB="2600000000000000010000000000000000000000000000000400000000000000dd2b000000080000010000000000000000000000800000000010000000000000ffff000000000000e700000000000000002000000000800000c0020000", @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES16=r1], 0xa8) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x7, 0x115400) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f00000002c0)={'fscrypt:', @auto=[0x33, 0x35, 0x34, 0x61, 0x32, 0xc2, 0x35, 0x62, 0x33, 0x35, 0x34, 0x62, 0x65, 0x32, 0x61, 0x31]}, &(0x7f0000000380)={0x0, "2b8195d65fe7dac7b728f54771a4140b2d7345d175eb8b9a033d05b32c8a78c87732f4a69843486defcadc1639c6359ea7ebda3fce9c9a95ea3aa9aa89b5748a", 0x2e}, 0x48, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0xe3) 07:44:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:26 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:26 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:26 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="a8000000daffffff", @ANYRES64=0x0, @ANYBLOB="2600000000000000010000000000000000000000000000000400000000000000dd2b000000080000010000000000000000000000800000000010000000000000ffff000000000000e700000000000000002000000000800000c0020000", @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES16=r1], 0xa8) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x7, 0x115400) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f00000002c0)={'fscrypt:', @auto=[0x33, 0x35, 0x34, 0x61, 0x32, 0xc2, 0x35, 0x62, 0x33, 0x35, 0x34, 0x62, 0x65, 0x32, 0x61, 0x31]}, &(0x7f0000000380)={0x0, "2b8195d65fe7dac7b728f54771a4140b2d7345d175eb8b9a033d05b32c8a78c87732f4a69843486defcadc1639c6359ea7ebda3fce9c9a95ea3aa9aa89b5748a", 0x2e}, 0x48, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0xe3) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="a8000000daffffff", @ANYRES64=0x0, @ANYBLOB="2600000000000000010000000000000000000000000000000400000000000000dd2b000000080000010000000000000000000000800000000010000000000000ffff000000000000e700000000000000002000000000800000c0020000", @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES16=r1], 0xa8) (async) syz_open_dev$sg(&(0x7f0000000080), 0x7, 0x115400) (async) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f00000002c0)={'fscrypt:', @auto=[0x33, 0x35, 0x34, 0x61, 0x32, 0xc2, 0x35, 0x62, 0x33, 0x35, 0x34, 0x62, 0x65, 0x32, 0x61, 0x31]}, &(0x7f0000000380)={0x0, "2b8195d65fe7dac7b728f54771a4140b2d7345d175eb8b9a033d05b32c8a78c87732f4a69843486defcadc1639c6359ea7ebda3fce9c9a95ea3aa9aa89b5748a", 0x2e}, 0x48, r0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0xe3) (async) 07:44:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:26 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) socket$nl_generic(0x10, 0x3, 0x10) 07:44:26 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:26 executing program 2: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0xfffffff9, 0x4000}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0xf1b, [0x8000, 0x2], 0x12}, 0x10) 07:44:26 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="a8000000daffffff", @ANYRES64=0x0, @ANYBLOB="2600000000000000010000000000000000000000000000000400000000000000dd2b000000080000010000000000000000000000800000000010000000000000ffff000000000000e700000000000000002000000000800000c0020000", @ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES16=r1], 0xa8) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x7, 0x115400) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000000c0)) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f00000002c0)={'fscrypt:', @auto=[0x33, 0x35, 0x34, 0x61, 0x32, 0xc2, 0x35, 0x62, 0x33, 0x35, 0x34, 0x62, 0x65, 0x32, 0x61, 0x31]}, &(0x7f0000000380)={0x0, "2b8195d65fe7dac7b728f54771a4140b2d7345d175eb8b9a033d05b32c8a78c87732f4a69843486defcadc1639c6359ea7ebda3fce9c9a95ea3aa9aa89b5748a", 0x2e}, 0x48, r0) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0xe3) 07:44:26 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:27 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:27 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) 07:44:27 executing program 2: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0xfffffff9, 0x4000}) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async, rerun: 64) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0xf1b, [0x8000, 0x2], 0x12}, 0x10) (rerun: 64) 07:44:27 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "3367d7192f2fd00596f13e5b96f10621bfdef24c224af20e13c3f35a893f8c47a860c91448e7e7da5efc4e5e6bb795cb3e1fdf287579b10e87240ae7a6a30d8c", 0x33}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f48457d2ef3bdc48c900", 0xfffffffe}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:27 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:27 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:27 executing program 2: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0xfffffff9, 0x4000}) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0xf1b, [0x8000, 0x2], 0x12}, 0x10) 07:44:27 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "3367d7192f2fd00596f13e5b96f10621bfdef24c224af20e13c3f35a893f8c47a860c91448e7e7da5efc4e5e6bb795cb3e1fdf287579b10e87240ae7a6a30d8c", 0x33}, 0x48, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f48457d2ef3bdc48c900", 0xfffffffe}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:27 executing program 4: ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0xfffffff9, 0x4000}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000000c0)={0xf1b, [0x8000, 0x2], 0x12}, 0x10) 07:44:27 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:28 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:28 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "3367d7192f2fd00596f13e5b96f10621bfdef24c224af20e13c3f35a893f8c47a860c91448e7e7da5efc4e5e6bb795cb3e1fdf287579b10e87240ae7a6a30d8c", 0x33}, 0x48, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f48457d2ef3bdc48c900", 0xfffffffe}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {@default_permissions}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:28 executing program 5: bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:28 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x14}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:28 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:28 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 64) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 07:44:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x14}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:29 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x2}, 0x3) 07:44:29 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) 07:44:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000040)) (async) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) 07:44:29 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x14}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x14}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:29 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:29 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:44:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0x4, 0x4}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 07:44:29 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc0c3ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e6ef3bdc48c900", 0x40}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a073117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x8002a}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "f8d14650383d2d70aab5ea04989a037da5b2ca0585aba08fd9cf6472e586b1746760ec6d14bbcd12e329627a5d53787523b601f1d311970cf9e6f521db276e83", 0x19}, 0x48, r3) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51, 0x10000, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x111001, 0x0) write$P9_ROPEN(r4, &(0x7f00000002c0)={0x2e, 0x71, 0x2, {{0x2, 0x4, 0x800000040000000}, 0xb}}, 0x18) 07:44:29 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:29 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:44:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0x4, 0x4}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (rerun: 64) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 07:44:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:29 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) 07:44:29 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc0c3ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e6ef3bdc48c900", 0x40}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a073117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x8002a}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "f8d14650383d2d70aab5ea04989a037da5b2ca0585aba08fd9cf6472e586b1746760ec6d14bbcd12e329627a5d53787523b601f1d311970cf9e6f521db276e83", 0x19}, 0x48, r3) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51, 0x10000, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x111001, 0x0) write$P9_ROPEN(r4, &(0x7f00000002c0)={0x2e, 0x71, 0x2, {{0x2, 0x4, 0x800000040000000}, 0xb}}, 0x18) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc0c3ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e6ef3bdc48c900", 0x40}, 0x48, r0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a073117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x8002a}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "f8d14650383d2d70aab5ea04989a037da5b2ca0585aba08fd9cf6472e586b1746760ec6d14bbcd12e329627a5d53787523b601f1d311970cf9e6f521db276e83", 0x19}, 0x48, r3) (async) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51, 0x10000, 0x0, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x111001, 0x0) (async) write$P9_ROPEN(r4, &(0x7f00000002c0)={0x2e, 0x71, 0x2, {{0x2, 0x4, 0x800000040000000}, 0xb}}, 0x18) (async) 07:44:29 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@blksize}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0x4, 0x4}, 0x6) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async, rerun: 64) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) (rerun: 64) 07:44:30 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) 07:44:30 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0x4, 0x4}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) 07:44:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:30 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc0c3ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e6ef3bdc48c900", 0x40}, 0x48, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a073117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x8002a}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "f8d14650383d2d70aab5ea04989a037da5b2ca0585aba08fd9cf6472e586b1746760ec6d14bbcd12e329627a5d53787523b601f1d311970cf9e6f521db276e83", 0x19}, 0x48, r3) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51, 0x10000, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x111001, 0x0) write$P9_ROPEN(r4, &(0x7f00000002c0)={0x2e, 0x71, 0x2, {{0x2, 0x4, 0x800000040000000}, 0xb}}, 0x18) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "f546d0aaea9ddfc0c3ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e6ef3bdc48c900", 0x40}, 0x48, r0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a073117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x8002a}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "f8d14650383d2d70aab5ea04989a037da5b2ca0585aba08fd9cf6472e586b1746760ec6d14bbcd12e329627a5d53787523b601f1d311970cf9e6f521db276e83", 0x19}, 0x48, r3) (async) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000240)=""/81, 0x51, 0x10000, 0x0, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000300), 0x111001, 0x0) (async) write$P9_ROPEN(r4, &(0x7f00000002c0)={0x2e, 0x71, 0x2, {{0x2, 0x4, 0x800000040000000}, 0xb}}, 0x18) (async) 07:44:30 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) 07:44:30 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:30 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2081, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) 07:44:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:30 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) 07:44:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:30 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:30 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:30 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c04f000000ce4b8a3b55aeeda9bf2ff81105fa48023839106eb5210a9c4217e654f4c4d2ef3bdc48c900e500", 0x10}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "0f1d3f96c200e6759ad171cc46bfa0151cfd5dfa68badc659f657753ff66cf3bdbead0e3f3a7f27b0f112869fd5c02f7a3ef12b15e3419ce288604b264c56c13", 0x1b}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "7dd3864e1766c0ba232e9d665adc1c2b62b4d96ab5c03d6eb486ac5a3f707c94a79522b689d490a4f9245eecab0cc32a96600629be5374a0f42595bb3eba9846", 0x5}, 0x48, r0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000006c0)=0x1, 0x4) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:30 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2081, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) 07:44:31 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x4}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x8000) 07:44:31 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:31 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:31 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2081, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2081, 0x0) (async) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x2, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) (async) 07:44:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:31 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "b5107f2fbc4aeebeb4f7afaf6ad464da43267a28a671ba0d291d78d998342147d14e1103d81f85d9242fcfd52a5b704ce0e5003421da979b70a5bddfcc86c45c", 0x3c}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7b1e9db76a41fa2db3ab35cb9abd31dcfbda5f31d44c0d10f5df6cc815b0b7fca3218b562a6a7087d9ee7c5c4cf380d2f9a05670d939a8f0af0f066a0797b0bd", 0x18}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:31 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x6) 07:44:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:31 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "b5107f2fbc4aeebeb4f7afaf6ad464da43267a28a671ba0d291d78d998342147d14e1103d81f85d9242fcfd52a5b704ce0e5003421da979b70a5bddfcc86c45c", 0x3c}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7b1e9db76a41fa2db3ab35cb9abd31dcfbda5f31d44c0d10f5df6cc815b0b7fca3218b562a6a7087d9ee7c5c4cf380d2f9a05670d939a8f0af0f066a0797b0bd", 0x18}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:31 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1}, 0x6) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) 07:44:31 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "b5107f2fbc4aeebeb4f7afaf6ad464da43267a28a671ba0d291d78d998342147d14e1103d81f85d9242fcfd52a5b704ce0e5003421da979b70a5bddfcc86c45c", 0x3c}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "7b1e9db76a41fa2db3ab35cb9abd31dcfbda5f31d44c0d10f5df6cc815b0b7fca3218b562a6a7087d9ee7c5c4cf380d2f9a05670d939a8f0af0f066a0797b0bd", 0x18}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:32 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x37, 0x36, 0x31, 0x31, 0x39, 0x30, 0x30, 0x62, 0x39, 0x66, 0x30]}, &(0x7f00000001c0)={0x0, "191ada7d05a2dbdd15a86131e761ecb01a302b1736a2f9b88aa6010e45cfa62742291331dc6b640dce6cb4aa81d7753fc65d93272ff1d26dc74e684a37e2b55a", 0x31}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f51ee5d7cf8a343cf0054c1c93f4b37b3607a90227cb9fd1dc8953b5de4cd0a65c148d35067ac0c56c9a8fd47f4d3a51466e07e6a81043e404cfb343be42b5f3", 0x31}, 0x48, r0) 07:44:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:32 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1}, 0x6) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) 07:44:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) pipe2$9p(&(0x7f0000000200), 0x4000) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000140)={'fscrypt:', @auto=[0x63, 0x30, 0x5, 0x65, 0x35, 0xaf1e2ec1900b1710, 0x66, 0x37, 0x37, 0x35, 0x66, 0x63, 0x62, 0x30, 0x35, 0x65]}, &(0x7f0000000180)={0x0, "b7cc458da147a8ed215c16bcde3f9eeb4a946e98a0c9efa58935a17a938d2686e4c0cfb61bdac8c2a814e6e165849c03b8b74e9d40c4a1cecd2e469a6bb49ade", 0x22}, 0x9e, r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x153000, 0x0) write$P9_RCREATE(r2, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x1, 0x3, 0x5}, 0x20}}, 0x18) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f00000003c0)={0x1, @default, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1f, 0x0, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000380)=0x4) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r1) 07:44:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) pipe2$9p(&(0x7f0000000200), 0x4000) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000140)={'fscrypt:', @auto=[0x63, 0x30, 0x5, 0x65, 0x35, 0xaf1e2ec1900b1710, 0x66, 0x37, 0x37, 0x35, 0x66, 0x63, 0x62, 0x30, 0x35, 0x65]}, &(0x7f0000000180)={0x0, "b7cc458da147a8ed215c16bcde3f9eeb4a946e98a0c9efa58935a17a938d2686e4c0cfb61bdac8c2a814e6e165849c03b8b74e9d40c4a1cecd2e469a6bb49ade", 0x22}, 0x9e, r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x153000, 0x0) write$P9_RCREATE(r2, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x1, 0x3, 0x5}, 0x20}}, 0x18) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f00000003c0)={0x1, @default, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1f, 0x0, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000380)=0x4) (async) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r1) 07:44:32 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 1) 07:44:32 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (fail_nth: 1) 07:44:32 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x1}, 0x6) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) 07:44:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) [ 1177.339755] FAULT_INJECTION: forcing a failure. [ 1177.339755] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.383377] CPU: 0 PID: 428 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1177.391127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.400485] Call Trace: [ 1177.403078] dump_stack+0x1b2/0x281 [ 1177.406714] should_fail.cold+0x10a/0x149 [ 1177.410882] should_failslab+0xd6/0x130 [ 1177.414860] kmem_cache_alloc_node+0x54/0x410 [ 1177.419359] __alloc_skb+0x5c/0x510 [ 1177.422991] send_monitor_note+0xca/0x420 [ 1177.427143] ? create_monitor_ctrl_open+0x630/0x630 [ 1177.432161] ? apparmor_capable+0xfa/0x4a0 [ 1177.436400] ? security_capable+0x88/0xb0 [ 1177.440560] hci_sock_bind+0x631/0x12b0 [ 1177.444746] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1177.448894] ? security_socket_bind+0x83/0xb0 [ 1177.453391] SyS_bind+0x174/0x1f0 [ 1177.456946] ? SyS_socketpair+0x480/0x480 [ 1177.461097] ? wait_for_completion_io+0x10/0x10 [ 1177.465769] ? vfs_write+0x319/0x4d0 [ 1177.469485] ? fput_many+0xe/0x140 [ 1177.473025] ? SyS_write+0x14d/0x210 [ 1177.476744] ? SyS_read+0x210/0x210 [ 1177.480369] ? __do_page_fault+0x159/0xad0 [ 1177.484608] ? do_syscall_64+0x4c/0x640 [ 1177.488579] ? SyS_socketpair+0x480/0x480 [ 1177.492714] do_syscall_64+0x1d5/0x640 [ 1177.496610] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1177.501784] RIP: 0033:0x7efd5c237109 [ 1177.505590] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1177.513283] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1177.520538] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1177.527792] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.535046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.542295] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:33 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x2, 0x2, "c7deda", 0x6, 0x7f}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0xfffffffffffffed6) 07:44:33 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) pipe2$9p(&(0x7f0000000200), 0x4000) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000140)={'fscrypt:', @auto=[0x63, 0x30, 0x5, 0x65, 0x35, 0xaf1e2ec1900b1710, 0x66, 0x37, 0x37, 0x35, 0x66, 0x63, 0x62, 0x30, 0x35, 0x65]}, &(0x7f0000000180)={0x0, "b7cc458da147a8ed215c16bcde3f9eeb4a946e98a0c9efa58935a17a938d2686e4c0cfb61bdac8c2a814e6e165849c03b8b74e9d40c4a1cecd2e469a6bb49ade", 0x22}, 0x9e, r0) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x153000, 0x0) write$P9_RCREATE(r2, &(0x7f0000000480)={0x18, 0x73, 0x2, {{0x1, 0x3, 0x5}, 0x20}}, 0x18) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) (async) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f00000003c0)={0x1, @default, @netrom={'nr', 0x0}, 0x5, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1f, 0x0, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}) (async) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000300), &(0x7f0000000380)=0x4) (async) add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, r1) 07:44:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x121000, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:33 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 2) 07:44:33 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x121000, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x121000, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) 07:44:33 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:33 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x121000, 0x0) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1178.201383] FAULT_INJECTION: forcing a failure. [ 1178.201383] name failslab, interval 1, probability 0, space 0, times 0 07:44:33 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1178.244218] CPU: 0 PID: 465 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1178.251947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.261314] Call Trace: [ 1178.261329] dump_stack+0x1b2/0x281 [ 1178.267516] should_fail.cold+0x10a/0x149 [ 1178.271670] should_failslab+0xd6/0x130 [ 1178.275647] kmem_cache_alloc_node_trace+0x58/0x400 [ 1178.280843] __kmalloc_node_track_caller+0x38/0x70 [ 1178.285771] __alloc_skb+0x96/0x510 [ 1178.289399] send_monitor_note+0xca/0x420 [ 1178.293555] ? create_monitor_ctrl_open+0x630/0x630 [ 1178.298570] ? apparmor_capable+0xfa/0x4a0 [ 1178.302813] ? security_capable+0x88/0xb0 [ 1178.306964] hci_sock_bind+0x631/0x12b0 [ 1178.310940] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1178.315082] ? security_socket_bind+0x83/0xb0 [ 1178.319578] SyS_bind+0x174/0x1f0 [ 1178.323028] ? SyS_socketpair+0x480/0x480 [ 1178.327214] ? wait_for_completion_io+0x10/0x10 [ 1178.331864] ? vfs_write+0x319/0x4d0 [ 1178.335557] ? fput_many+0xe/0x140 [ 1178.339090] ? SyS_write+0x14d/0x210 [ 1178.342781] ? SyS_read+0x210/0x210 [ 1178.346384] ? __do_page_fault+0x159/0xad0 [ 1178.350605] ? do_syscall_64+0x4c/0x640 [ 1178.354557] ? SyS_socketpair+0x480/0x480 [ 1178.358682] do_syscall_64+0x1d5/0x640 [ 1178.362553] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1178.367721] RIP: 0033:0x7efd5c237109 [ 1178.371412] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1178.379104] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1178.386352] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 07:44:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) [ 1178.393603] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.400847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.408096] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x2, 0x2, "c7deda", 0x6, 0x7f}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0xfffffffffffffed6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x2, 0x2, "c7deda", 0x6, 0x7f}) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0xfffffffffffffed6) (async) 07:44:34 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:34 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 3) 07:44:34 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:34 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:34 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)) 07:44:34 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) [ 1179.072524] FAULT_INJECTION: forcing a failure. [ 1179.072524] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.110732] CPU: 1 PID: 512 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1179.118463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.127817] Call Trace: [ 1179.130411] dump_stack+0x1b2/0x281 [ 1179.134049] should_fail.cold+0x10a/0x149 [ 1179.138203] should_failslab+0xd6/0x130 [ 1179.142180] kmem_cache_alloc_node+0x54/0x410 [ 1179.146679] __alloc_skb+0x5c/0x510 [ 1179.150309] send_monitor_note+0xca/0x420 [ 1179.154457] ? create_monitor_ctrl_open+0x630/0x630 [ 1179.159468] ? apparmor_capable+0xfa/0x4a0 [ 1179.163704] ? security_capable+0x88/0xb0 [ 1179.167851] hci_sock_bind+0x64a/0x12b0 [ 1179.171822] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1179.175971] ? security_socket_bind+0x83/0xb0 [ 1179.180467] SyS_bind+0x174/0x1f0 [ 1179.183919] ? SyS_socketpair+0x480/0x480 [ 1179.188067] ? wait_for_completion_io+0x10/0x10 [ 1179.192736] ? vfs_write+0x319/0x4d0 [ 1179.196452] ? fput_many+0xe/0x140 [ 1179.199997] ? SyS_write+0x14d/0x210 [ 1179.203712] ? SyS_read+0x210/0x210 [ 1179.207336] ? __do_page_fault+0x159/0xad0 [ 1179.211571] ? do_syscall_64+0x4c/0x640 [ 1179.215542] ? SyS_socketpair+0x480/0x480 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) [ 1179.219689] do_syscall_64+0x1d5/0x640 [ 1179.223578] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1179.228766] RIP: 0033:0x7efd5c237109 [ 1179.232470] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1179.240171] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1179.247430] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1179.254691] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1179.261952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:44:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x2, 0x2, "c7deda", 0x6, 0x7f}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0xfffffffffffffed6) 07:44:34 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)) [ 1179.269218] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:34 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 4) 07:44:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}], [{@context={'context', 0x3d, 'root'}}]}}) 07:44:34 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) [ 1179.399003] FAULT_INJECTION: forcing a failure. [ 1179.399003] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.410625] CPU: 0 PID: 564 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1179.418341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.427691] Call Trace: [ 1179.430281] dump_stack+0x1b2/0x281 [ 1179.433921] should_fail.cold+0x10a/0x149 [ 1179.438080] should_failslab+0xd6/0x130 [ 1179.442164] kmem_cache_alloc_node_trace+0x58/0x400 [ 1179.447189] __kmalloc_node_track_caller+0x38/0x70 [ 1179.452122] __alloc_skb+0x96/0x510 [ 1179.455755] send_monitor_note+0xca/0x420 [ 1179.459901] ? create_monitor_ctrl_open+0x630/0x630 [ 1179.464919] ? apparmor_capable+0xfa/0x4a0 [ 1179.469166] ? security_capable+0x88/0xb0 [ 1179.473319] hci_sock_bind+0x64a/0x12b0 [ 1179.477294] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1179.481444] ? security_socket_bind+0x83/0xb0 [ 1179.485943] SyS_bind+0x174/0x1f0 [ 1179.489400] ? SyS_socketpair+0x480/0x480 [ 1179.493549] ? wait_for_completion_io+0x10/0x10 [ 1179.498220] ? vfs_write+0x319/0x4d0 [ 1179.501936] ? fput_many+0xe/0x140 [ 1179.505490] ? SyS_write+0x14d/0x210 [ 1179.509204] ? SyS_read+0x210/0x210 [ 1179.512826] ? __do_page_fault+0x159/0xad0 [ 1179.517054] ? do_syscall_64+0x4c/0x640 [ 1179.521024] ? SyS_socketpair+0x480/0x480 [ 1179.525162] do_syscall_64+0x1d5/0x640 [ 1179.529033] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1179.534203] RIP: 0033:0x7efd5c237109 [ 1179.537896] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1179.545594] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1179.552843] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1179.560096] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1179.567460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1179.574731] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:35 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)) 07:44:35 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) 07:44:35 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x61, 0x62, 0x65, 0x32, 0x35, 0x38, 0x36, 0x64, 0x62, 0x35, 0x33, 0x36, 0x36, 0x31, 0x32]}, &(0x7f0000000140)={0x0, "47b1fba0f73691a0f32041056d128138d3d6ba5472f24438d401344c7b17c6a9d1389b86c098d2f16d2921733f5d264ed8a56eb54845ea5e1fd196329eec9868", 0x15}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:35 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 5) [ 1179.948959] FAULT_INJECTION: forcing a failure. [ 1179.948959] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.960397] CPU: 1 PID: 584 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1179.968106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.977470] Call Trace: [ 1179.980059] dump_stack+0x1b2/0x281 [ 1179.983691] should_fail.cold+0x10a/0x149 [ 1179.987847] should_failslab+0xd6/0x130 [ 1179.991824] kmem_cache_alloc_node+0x54/0x410 07:44:35 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x61, 0x62, 0x65, 0x32, 0x35, 0x38, 0x36, 0x64, 0x62, 0x35, 0x33, 0x36, 0x36, 0x31, 0x32]}, &(0x7f0000000140)={0x0, "47b1fba0f73691a0f32041056d128138d3d6ba5472f24438d401344c7b17c6a9d1389b86c098d2f16d2921733f5d264ed8a56eb54845ea5e1fd196329eec9868", 0x15}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xad) [ 1179.996331] __alloc_skb+0x5c/0x510 [ 1179.999979] create_monitor_event+0x3a1/0x800 [ 1180.004477] hci_sock_bind+0x786/0x12b0 [ 1180.008461] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1180.012616] ? security_socket_bind+0x83/0xb0 [ 1180.017113] SyS_bind+0x174/0x1f0 [ 1180.020575] ? SyS_socketpair+0x480/0x480 [ 1180.024726] ? wait_for_completion_io+0x10/0x10 [ 1180.029392] ? vfs_write+0x319/0x4d0 [ 1180.033203] ? fput_many+0xe/0x140 [ 1180.036741] ? SyS_write+0x14d/0x210 [ 1180.040455] ? SyS_read+0x210/0x210 [ 1180.044079] ? __do_page_fault+0x159/0xad0 [ 1180.048315] ? do_syscall_64+0x4c/0x640 [ 1180.052290] ? SyS_socketpair+0x480/0x480 [ 1180.056437] do_syscall_64+0x1d5/0x640 [ 1180.060327] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1180.065513] RIP: 0033:0x7efd5c237109 [ 1180.069219] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1180.076925] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1180.084194] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1180.091464] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1180.098736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1180.106006] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:35 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) sendto$x25(r1, &(0x7f0000000040)="c40409e6", 0x4, 0x20000000, &(0x7f00000000c0), 0x12) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0xa9e, 0x4) pipe(&(0x7f0000000180)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) 07:44:35 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async, rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xad) (rerun: 64) 07:44:35 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 6) 07:44:35 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x61, 0x62, 0x65, 0x32, 0x35, 0x38, 0x36, 0x64, 0x62, 0x35, 0x33, 0x36, 0x36, 0x31, 0x32]}, &(0x7f0000000140)={0x0, "47b1fba0f73691a0f32041056d128138d3d6ba5472f24438d401344c7b17c6a9d1389b86c098d2f16d2921733f5d264ed8a56eb54845ea5e1fd196329eec9868", 0x15}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:35 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 1180.207084] FAULT_INJECTION: forcing a failure. [ 1180.207084] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.218475] CPU: 1 PID: 616 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1180.226189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.235540] Call Trace: [ 1180.238130] dump_stack+0x1b2/0x281 [ 1180.241758] should_fail.cold+0x10a/0x149 [ 1180.245899] should_failslab+0xd6/0x130 [ 1180.249878] kmem_cache_alloc_node_trace+0x58/0x400 [ 1180.254906] __kmalloc_node_track_caller+0x38/0x70 [ 1180.259844] __alloc_skb+0x96/0x510 [ 1180.263472] create_monitor_event+0x3a1/0x800 [ 1180.267967] hci_sock_bind+0x786/0x12b0 [ 1180.271943] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1180.276093] ? security_socket_bind+0x83/0xb0 [ 1180.280595] SyS_bind+0x174/0x1f0 [ 1180.284054] ? SyS_socketpair+0x480/0x480 [ 1180.288206] ? wait_for_completion_io+0x10/0x10 [ 1180.292892] ? vfs_write+0x319/0x4d0 [ 1180.296634] ? fput_many+0xe/0x140 [ 1180.300179] ? SyS_write+0x14d/0x210 [ 1180.303890] ? SyS_read+0x210/0x210 [ 1180.307517] ? __do_page_fault+0x159/0xad0 [ 1180.311927] ? do_syscall_64+0x4c/0x640 [ 1180.315900] ? SyS_socketpair+0x480/0x480 [ 1180.320052] do_syscall_64+0x1d5/0x640 [ 1180.323955] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1180.329139] RIP: 0033:0x7efd5c237109 [ 1180.332846] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1180.340553] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1180.347818] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1180.355080] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1180.362328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1180.369690] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1180.377564] Bluetooth: hci2 command 0x0401 tx timeout 07:44:36 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:36 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r2, 0x0, &(0x7f00000005c0)) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xad) 07:44:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) sendto$x25(r1, &(0x7f0000000040)="c40409e6", 0x4, 0x20000000, &(0x7f00000000c0), 0x12) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0xa9e, 0x4) pipe(&(0x7f0000000180)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)) (async) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async) sendto$x25(r1, &(0x7f0000000040)="c40409e6", 0x4, 0x20000000, &(0x7f00000000c0), 0x12) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0xa9e, 0x4) (async) pipe(&(0x7f0000000180)) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) (async) 07:44:36 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x27, 0x3, 0x0, {0x2, 0x6, 0x0, 'logon\x00'}}, 0x27) 07:44:36 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 7) [ 1180.923584] FAULT_INJECTION: forcing a failure. [ 1180.923584] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.935015] CPU: 1 PID: 643 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1180.942727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.952079] Call Trace: [ 1180.954666] dump_stack+0x1b2/0x281 [ 1180.958301] should_fail.cold+0x10a/0x149 [ 1180.962459] should_failslab+0xd6/0x130 [ 1180.966446] kmem_cache_alloc_node+0x54/0x410 07:44:36 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "707d20adb3c4c9eac76d19da4a58253798c37b8e7db80f5ed29bca6603d6dae329d2a955bc524f88a2df40ff0069667ae9a6325d2caec1698686041bf051e3ef", 0x23}, 0x48, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f00000004c0)={0x0, "338ac5499855a41e5b846f7f4eab675d225972e5e683211edd7788e37636960ad85d5d102efae4d71f5883aecb393c67cb518574531303c8c2ee9f2d01307658", 0x18}, 0x48, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x26) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9ea6a65ea20f09205dd12935de62880c974c7ba6d519bc04ff3c1e384e7e0892902c712c271070d91bf00aaa6324bfdc7b599651abd30ab31e4ae3cf6663b231", 0x3d}, 0x48, r1) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0xc003, 0x0) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000400)=0x4, 0x4) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000200)=0x800) [ 1180.970948] __alloc_skb+0x5c/0x510 [ 1180.974581] create_monitor_event+0x65a/0x800 [ 1180.979077] hci_sock_bind+0x6d7/0x12b0 [ 1180.983052] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1180.987200] ? security_socket_bind+0x83/0xb0 [ 1180.991694] SyS_bind+0x174/0x1f0 [ 1180.995155] ? SyS_socketpair+0x480/0x480 [ 1180.999300] ? wait_for_completion_io+0x10/0x10 [ 1181.003990] ? vfs_write+0x319/0x4d0 [ 1181.007704] ? fput_many+0xe/0x140 [ 1181.011242] ? SyS_write+0x14d/0x210 [ 1181.014972] ? SyS_read+0x210/0x210 [ 1181.018603] ? __do_page_fault+0x159/0xad0 07:44:36 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "707d20adb3c4c9eac76d19da4a58253798c37b8e7db80f5ed29bca6603d6dae329d2a955bc524f88a2df40ff0069667ae9a6325d2caec1698686041bf051e3ef", 0x23}, 0x48, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f00000004c0)={0x0, "338ac5499855a41e5b846f7f4eab675d225972e5e683211edd7788e37636960ad85d5d102efae4d71f5883aecb393c67cb518574531303c8c2ee9f2d01307658", 0x18}, 0x48, r2) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x26) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9ea6a65ea20f09205dd12935de62880c974c7ba6d519bc04ff3c1e384e7e0892902c712c271070d91bf00aaa6324bfdc7b599651abd30ab31e4ae3cf6663b231", 0x3d}, 0x48, r1) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0xc003, 0x0) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000400)=0x4, 0x4) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000200)=0x800) 07:44:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) (async, rerun: 64) sendto$x25(r1, &(0x7f0000000040)="c40409e6", 0x4, 0x20000000, &(0x7f00000000c0), 0x12) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000140)=0xa9e, 0x4) pipe(&(0x7f0000000180)) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) [ 1181.022838] ? do_syscall_64+0x4c/0x640 [ 1181.026813] ? SyS_socketpair+0x480/0x480 [ 1181.030967] do_syscall_64+0x1d5/0x640 [ 1181.034863] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1181.040048] RIP: 0033:0x7efd5c237109 [ 1181.043749] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1181.051453] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1181.058718] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1181.065984] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 07:44:36 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async, rerun: 32) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x27, 0x3, 0x0, {0x2, 0x6, 0x0, 'logon\x00'}}, 0x27) 07:44:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@context={'context', 0x3d, 'root'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}*(:@(\xc5'}}]}}) [ 1181.073244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1181.080510] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:36 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "707d20adb3c4c9eac76d19da4a58253798c37b8e7db80f5ed29bca6603d6dae329d2a955bc524f88a2df40ff0069667ae9a6325d2caec1698686041bf051e3ef", 0x23}, 0x48, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f00000004c0)={0x0, "338ac5499855a41e5b846f7f4eab675d225972e5e683211edd7788e37636960ad85d5d102efae4d71f5883aecb393c67cb518574531303c8c2ee9f2d01307658", 0x18}, 0x48, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x26) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9ea6a65ea20f09205dd12935de62880c974c7ba6d519bc04ff3c1e384e7e0892902c712c271070d91bf00aaa6324bfdc7b599651abd30ab31e4ae3cf6663b231", 0x3d}, 0x48, r1) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0xc003, 0x0) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000400)=0x4, 0x4) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000200)=0x800) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc2}, &(0x7f0000000380)={0x0, "707d20adb3c4c9eac76d19da4a58253798c37b8e7db80f5ed29bca6603d6dae329d2a955bc524f88a2df40ff0069667ae9a6325d2caec1698686041bf051e3ef", 0x23}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f00000004c0)={0x0, "338ac5499855a41e5b846f7f4eab675d225972e5e683211edd7788e37636960ad85d5d102efae4d71f5883aecb393c67cb518574531303c8c2ee9f2d01307658", 0x18}, 0x48, r2) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r3, 0xffffffffffffffff, 0x26) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "9ea6a65ea20f09205dd12935de62880c974c7ba6d519bc04ff3c1e384e7e0892902c712c271070d91bf00aaa6324bfdc7b599651abd30ab31e4ae3cf6663b231", 0x3d}, 0x48, r1) (async) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0xc003, 0x0) (async) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000400)=0x4, 0x4) (async) ioctl$SG_SET_RESERVED_SIZE(r4, 0x2275, &(0x7f0000000200)=0x800) (async) 07:44:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) pipe2$watch_queue(&(0x7f00000000c0), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x100000001, 0x7}}, 0x30) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000040)=0x7fff, 0x4) 07:44:37 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:37 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x27, 0x3, 0x0, {0x2, 0x6, 0x0, 'logon\x00'}}, 0x27) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x27, 0x3, 0x0, {0x2, 0x6, 0x0, 'logon\x00'}}, 0x27) (async) 07:44:37 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x100000001, 0x7}}, 0x30) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000040)=0x7fff, 0x4) 07:44:37 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 8) 07:44:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 1) 07:44:37 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e588c61d01010000b42f10106eb5250e4a3117e654f4c4ed00635313573fdb57d2ef3bdc48c900"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1181.826841] FAULT_INJECTION: forcing a failure. [ 1181.826841] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.838158] CPU: 1 PID: 710 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1181.845862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.855212] Call Trace: [ 1181.857799] dump_stack+0x1b2/0x281 [ 1181.861443] should_fail.cold+0x10a/0x149 [ 1181.865595] should_failslab+0xd6/0x130 [ 1181.869575] kmem_cache_alloc_node_trace+0x58/0x400 [ 1181.874644] __kmalloc_node_track_caller+0x38/0x70 [ 1181.875714] FAULT_INJECTION: forcing a failure. [ 1181.875714] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.880006] __alloc_skb+0x96/0x510 [ 1181.880030] create_monitor_event+0x65a/0x800 [ 1181.880040] hci_sock_bind+0x6d7/0x12b0 [ 1181.880053] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1181.907410] ? security_socket_bind+0x83/0xb0 [ 1181.911891] SyS_bind+0x174/0x1f0 [ 1181.915327] ? SyS_socketpair+0x480/0x480 [ 1181.919464] ? wait_for_completion_io+0x10/0x10 [ 1181.924124] ? vfs_write+0x319/0x4d0 [ 1181.927849] ? fput_many+0xe/0x140 [ 1181.931387] ? SyS_write+0x14d/0x210 [ 1181.935094] ? SyS_read+0x210/0x210 [ 1181.938708] ? __do_page_fault+0x159/0xad0 [ 1181.942926] ? do_syscall_64+0x4c/0x640 [ 1181.946884] ? SyS_socketpair+0x480/0x480 [ 1181.951015] do_syscall_64+0x1d5/0x640 [ 1181.954888] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1181.960059] RIP: 0033:0x7efd5c237109 [ 1181.963754] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1181.971447] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1181.978696] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1181.985944] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1181.993199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.000450] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1182.007714] CPU: 0 PID: 714 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1182.015431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.024779] Call Trace: [ 1182.027370] dump_stack+0x1b2/0x281 [ 1182.031006] should_fail.cold+0x10a/0x149 [ 1182.035157] should_failslab+0xd6/0x130 [ 1182.039132] __kmalloc_track_caller+0x2bc/0x400 [ 1182.043801] ? strndup_user+0x5b/0xf0 [ 1182.047610] memdup_user+0x22/0xa0 [ 1182.051146] strndup_user+0x5b/0xf0 [ 1182.054767] ? copy_mnt_ns+0xa30/0xa30 [ 1182.058654] SyS_mount+0x39/0x120 [ 1182.062102] ? copy_mnt_ns+0xa30/0xa30 [ 1182.065992] do_syscall_64+0x1d5/0x640 [ 1182.069886] entry_SYSCALL_64_after_hwframe+0x46/0xbb 07:44:37 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 9) [ 1182.075070] RIP: 0033:0x7f0f45693109 [ 1182.078776] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1182.083802] FAULT_INJECTION: forcing a failure. [ 1182.083802] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.086478] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1182.086485] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1182.086490] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1182.086496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.086502] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1182.134504] CPU: 1 PID: 733 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1182.142212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.151569] Call Trace: [ 1182.154157] dump_stack+0x1b2/0x281 [ 1182.157785] should_fail.cold+0x10a/0x149 [ 1182.161935] should_failslab+0xd6/0x130 [ 1182.165911] kmem_cache_alloc_node+0x54/0x410 [ 1182.170406] __alloc_skb+0x5c/0x510 [ 1182.174036] create_monitor_event+0x7e/0x800 07:44:37 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x100000, 0x4, 0xc1, 0x73, 0x81}) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:37 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e588c61d01010000b42f10106eb5250e4a3117e654f4c4ed00635313573fdb57d2ef3bdc48c900"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:37 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e588c61d01010000b42f10106eb5250e4a3117e654f4c4ed00635313573fdb57d2ef3bdc48c900"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:37 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x100000, 0x4, 0xc1, 0x73, 0x81}) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (rerun: 32) 07:44:37 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x62, 0x31, 0x38, 0x32, 0x34, 0x64, 0x61, 0x60, 0x3b, 0x33, 0x31, 0x30, 0x33, 0x65, 0x38]}, &(0x7f0000000140)={0x0, "0b06cd8b351e55c589a3973a0dd4cf14757389030b450149380383ad189ce8248cdf01060581ba2ed62a39e9f45ef705174db631c9348bf16d06354de6b0c777", 0x18}, 0x48, r0) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xde) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1182.178445] hci_sock_bind+0xc1b/0x12b0 [ 1182.182427] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1182.186578] ? security_socket_bind+0x83/0xb0 [ 1182.191071] SyS_bind+0x174/0x1f0 [ 1182.194521] ? SyS_socketpair+0x480/0x480 [ 1182.198666] ? wait_for_completion_io+0x10/0x10 [ 1182.203335] ? vfs_write+0x319/0x4d0 [ 1182.207045] ? fput_many+0xe/0x140 [ 1182.210582] ? SyS_write+0x14d/0x210 [ 1182.214296] ? SyS_read+0x210/0x210 [ 1182.217918] ? __do_page_fault+0x159/0xad0 [ 1182.222248] ? do_syscall_64+0x4c/0x640 [ 1182.226228] ? SyS_socketpair+0x480/0x480 [ 1182.230376] do_syscall_64+0x1d5/0x640 [ 1182.234266] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1182.239452] RIP: 0033:0x7efd5c237109 [ 1182.243159] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1182.250869] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1182.258132] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1182.265401] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.272666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.279932] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1182.425983] Bluetooth: hci2 command 0x0401 tx timeout 07:44:38 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000080)={0x100000, 0x4, 0xc1, 0x73, 0x81}) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:38 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x62, 0x31, 0x38, 0x32, 0x34, 0x64, 0x61, 0x60, 0x3b, 0x33, 0x31, 0x30, 0x33, 0x65, 0x38]}, &(0x7f0000000140)={0x0, "0b06cd8b351e55c589a3973a0dd4cf14757389030b450149380383ad189ce8248cdf01060581ba2ed62a39e9f45ef705174db631c9348bf16d06354de6b0c777", 0x18}, 0x48, r0) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xde) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:38 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async, rerun: 32) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x100000001, 0x7}}, 0x30) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async, rerun: 32) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000040)=0x7fff, 0x4) (rerun: 32) 07:44:38 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 2) 07:44:38 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 10) 07:44:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:38 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x64, 0x62, 0x31, 0x38, 0x32, 0x34, 0x64, 0x61, 0x60, 0x3b, 0x33, 0x31, 0x30, 0x33, 0x65, 0x38]}, &(0x7f0000000140)={0x0, "0b06cd8b351e55c589a3973a0dd4cf14757389030b450149380383ad189ce8248cdf01060581ba2ed62a39e9f45ef705174db631c9348bf16d06354de6b0c777", 0x18}, 0x48, r0) (async) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xde) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1182.794671] FAULT_INJECTION: forcing a failure. [ 1182.794671] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.806026] CPU: 1 PID: 768 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1182.813733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.823084] Call Trace: [ 1182.825671] dump_stack+0x1b2/0x281 [ 1182.829314] should_fail.cold+0x10a/0x149 [ 1182.833463] should_failslab+0xd6/0x130 [ 1182.837439] kmem_cache_alloc_node_trace+0x58/0x400 [ 1182.842472] __kmalloc_node_track_caller+0x38/0x70 [ 1182.847400] __alloc_skb+0x96/0x510 [ 1182.851025] create_monitor_event+0x7e/0x800 [ 1182.855439] hci_sock_bind+0xc1b/0x12b0 [ 1182.859409] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1182.863557] ? security_socket_bind+0x83/0xb0 [ 1182.868055] SyS_bind+0x174/0x1f0 [ 1182.871515] ? SyS_socketpair+0x480/0x480 [ 1182.875679] ? wait_for_completion_io+0x10/0x10 [ 1182.880352] ? vfs_write+0x319/0x4d0 [ 1182.884062] ? fput_many+0xe/0x140 [ 1182.887597] ? SyS_write+0x14d/0x210 [ 1182.891308] ? SyS_read+0x210/0x210 07:44:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) [ 1182.894933] ? __do_page_fault+0x159/0xad0 [ 1182.899166] ? do_syscall_64+0x4c/0x640 [ 1182.903140] ? SyS_socketpair+0x480/0x480 [ 1182.907292] do_syscall_64+0x1d5/0x640 [ 1182.911185] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1182.916368] RIP: 0033:0x7efd5c237109 [ 1182.920074] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1182.927779] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1182.935044] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 07:44:38 executing program 0: accept4$x25(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x12, 0xc00) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffee6, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000400)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "46d146899a66753728799b44ed08301c92b9411efe8e98a9123e48329458499828d1020f535093c0fd6dbffefd3ffeae709d0f4690b618acb20094a70fbc2f5f", 0x13}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "656260e8cc1f449fc2ab6763f8d86c0cde2cc1db279bca31031611f1c74cd9104807a094f8dca14720cc37c443a29f4a0fdc0944e28c63bfd3ed5d55a57a35cd", 0x24}, 0x48, r1) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x60000, 0x0) bind$x25(r2, &(0x7f0000000440)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:38 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2480, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xbfff, 0x1}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000280)=0xfffffff8, 0x0) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000140)) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000040)="dab2b20c31a059b0f3c508590aad8c389519ed3ae019b847a11a557ba46bd4fce1115347c21c80a7cfb20af1a726378ef1980cd3568b1fbc2190f06cf2e19293efc7d74574106ea7bf0bee") ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0x9, 'erspan0\x00'}) 07:44:38 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 11) [ 1182.942315] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.949581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1182.956848] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1182.979826] FAULT_INJECTION: forcing a failure. [ 1182.979826] name failslab, interval 1, probability 0, space 0, times 0 [ 1183.035458] CPU: 0 PID: 790 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1183.043194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.052632] Call Trace: [ 1183.055222] dump_stack+0x1b2/0x281 [ 1183.058851] should_fail.cold+0x10a/0x149 [ 1183.063021] should_failslab+0xd6/0x130 [ 1183.063034] __kmalloc_track_caller+0x2bc/0x400 [ 1183.067283] FAULT_INJECTION: forcing a failure. [ 1183.067283] name failslab, interval 1, probability 0, space 0, times 0 [ 1183.071656] ? strndup_user+0x5b/0xf0 [ 1183.071669] memdup_user+0x22/0xa0 [ 1183.071682] strndup_user+0x5b/0xf0 [ 1183.093751] ? copy_mnt_ns+0xa30/0xa30 [ 1183.097619] SyS_mount+0x68/0x120 [ 1183.101053] ? copy_mnt_ns+0xa30/0xa30 [ 1183.104924] do_syscall_64+0x1d5/0x640 [ 1183.108797] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1183.113997] RIP: 0033:0x7f0f45693109 [ 1183.117687] RSP: 002b:00007f0f43fe7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1183.125383] RAX: ffffffffffffffda RBX: 00007f0f457a6030 RCX: 00007f0f45693109 [ 1183.132633] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1183.139882] RBP: 00007f0f43fe71d0 R08: 0000000020000380 R09: 0000000000000000 [ 1183.147131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1183.154382] R13: 00007fff2be8beef R14: 00007f0f43fe7300 R15: 0000000000022000 [ 1183.161656] CPU: 1 PID: 798 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1183.169361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.178708] Call Trace: [ 1183.181291] dump_stack+0x1b2/0x281 [ 1183.184921] should_fail.cold+0x10a/0x149 [ 1183.189070] should_failslab+0xd6/0x130 [ 1183.193048] kmem_cache_alloc_node+0x54/0x410 [ 1183.197541] __alloc_skb+0x5c/0x510 [ 1183.201256] create_monitor_event+0x3a1/0x800 [ 1183.205756] hci_sock_bind+0x786/0x12b0 [ 1183.209734] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1183.213882] ? security_socket_bind+0x83/0xb0 [ 1183.218381] SyS_bind+0x174/0x1f0 [ 1183.221835] ? SyS_socketpair+0x480/0x480 [ 1183.225987] ? wait_for_completion_io+0x10/0x10 [ 1183.230660] ? vfs_write+0x319/0x4d0 [ 1183.234369] ? fput_many+0xe/0x140 [ 1183.237903] ? SyS_write+0x14d/0x210 [ 1183.241613] ? SyS_read+0x210/0x210 [ 1183.245239] ? __do_page_fault+0x159/0xad0 [ 1183.249557] ? do_syscall_64+0x4c/0x640 [ 1183.253529] ? SyS_socketpair+0x480/0x480 [ 1183.257676] do_syscall_64+0x1d5/0x640 [ 1183.261565] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1183.266744] RIP: 0033:0x7efd5c237109 [ 1183.270444] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1183.278147] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1183.285415] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1183.292685] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.299954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1183.307223] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:39 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) 07:44:39 executing program 0: accept4$x25(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x12, 0xc00) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffee6, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000400)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "46d146899a66753728799b44ed08301c92b9411efe8e98a9123e48329458499828d1020f535093c0fd6dbffefd3ffeae709d0f4690b618acb20094a70fbc2f5f", 0x13}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "656260e8cc1f449fc2ab6763f8d86c0cde2cc1db279bca31031611f1c74cd9104807a094f8dca14720cc37c443a29f4a0fdc0944e28c63bfd3ed5d55a57a35cd", 0x24}, 0x48, r1) (async) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x60000, 0x0) bind$x25(r2, &(0x7f0000000440)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 3) 07:44:39 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2480, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) (async) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xbfff, 0x1}, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000280)=0xfffffff8, 0x0) (async) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000140)) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000040)="dab2b20c31a059b0f3c508590aad8c389519ed3ae019b847a11a557ba46bd4fce1115347c21c80a7cfb20af1a726378ef1980cd3568b1fbc2190f06cf2e19293efc7d74574106ea7bf0bee") (async) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0x9, 'erspan0\x00'}) 07:44:39 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 12) [ 1183.721318] FAULT_INJECTION: forcing a failure. [ 1183.721318] name failslab, interval 1, probability 0, space 0, times 0 [ 1183.723394] FAULT_INJECTION: forcing a failure. [ 1183.723394] name failslab, interval 1, probability 0, space 0, times 0 [ 1183.732692] CPU: 0 PID: 828 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1183.732698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.732701] Call Trace: [ 1183.732718] dump_stack+0x1b2/0x281 [ 1183.732736] should_fail.cold+0x10a/0x149 [ 1183.771514] should_failslab+0xd6/0x130 [ 1183.771527] kmem_cache_alloc_node_trace+0x58/0x400 [ 1183.780505] __kmalloc_node_track_caller+0x38/0x70 [ 1183.785444] __alloc_skb+0x96/0x510 [ 1183.789073] create_monitor_event+0x3a1/0x800 [ 1183.793559] hci_sock_bind+0x786/0x12b0 [ 1183.797518] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1183.801649] ? security_socket_bind+0x83/0xb0 [ 1183.806134] SyS_bind+0x174/0x1f0 [ 1183.809579] ? SyS_socketpair+0x480/0x480 [ 1183.814425] ? wait_for_completion_io+0x10/0x10 07:44:39 executing program 0: accept4$x25(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x12, 0xc00) (async) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffee6, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000400)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "46d146899a66753728799b44ed08301c92b9411efe8e98a9123e48329458499828d1020f535093c0fd6dbffefd3ffeae709d0f4690b618acb20094a70fbc2f5f", 0x13}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "656260e8cc1f449fc2ab6763f8d86c0cde2cc1db279bca31031611f1c74cd9104807a094f8dca14720cc37c443a29f4a0fdc0944e28c63bfd3ed5d55a57a35cd", 0x24}, 0x48, r1) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x60000, 0x0) bind$x25(r2, &(0x7f0000000440)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1183.819098] ? vfs_write+0x319/0x4d0 [ 1183.822807] ? fput_many+0xe/0x140 [ 1183.826340] ? SyS_write+0x14d/0x210 [ 1183.830044] ? SyS_read+0x210/0x210 [ 1183.833672] ? __do_page_fault+0x159/0xad0 [ 1183.837906] ? do_syscall_64+0x4c/0x640 [ 1183.841872] ? SyS_socketpair+0x480/0x480 [ 1183.846015] do_syscall_64+0x1d5/0x640 [ 1183.849897] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1183.855340] RIP: 0033:0x7efd5c237109 [ 1183.859157] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1183.866855] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1183.874114] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1183.881375] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.888638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1183.895902] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1183.917086] CPU: 1 PID: 822 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1183.924823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.934177] Call Trace: [ 1183.936766] dump_stack+0x1b2/0x281 [ 1183.940398] should_fail.cold+0x10a/0x149 [ 1183.944552] should_failslab+0xd6/0x130 [ 1183.948529] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1183.953191] ? copy_mnt_ns+0xa30/0xa30 [ 1183.957075] copy_mount_options+0x59/0x2f0 [ 1183.961302] ? copy_mnt_ns+0xa30/0xa30 [ 1183.965186] SyS_mount+0x84/0x120 [ 1183.968631] ? copy_mnt_ns+0xa30/0xa30 07:44:39 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2480, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) (async) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xbfff, 0x1}, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000280)=0xfffffff8, 0x0) (async) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000140)) (async) ioctl$sock_bt_hci(r2, 0x800448d3, &(0x7f0000000040)="dab2b20c31a059b0f3c508590aad8c389519ed3ae019b847a11a557ba46bd4fce1115347c21c80a7cfb20af1a726378ef1980cd3568b1fbc2190f06cf2e19293efc7d74574106ea7bf0bee") ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0x9, 'erspan0\x00'}) 07:44:39 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 13) 07:44:39 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x1}, 0x6) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "12e3216fdbeccb11d5290438d8a6a28347e44cc0a810016f8569154de7d9dfe1ea46c9a96e1f1b2f079e1e0cea0090d9bdfc0c4d77936af6e3f41d7516420ce8", 0x26}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) [ 1183.972512] do_syscall_64+0x1d5/0x640 [ 1183.976401] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1183.981668] RIP: 0033:0x7f0f45693109 [ 1183.985369] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1183.993074] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1184.000341] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1184.001478] FAULT_INJECTION: forcing a failure. [ 1184.001478] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.007598] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1184.007605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1184.007610] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1184.041078] CPU: 0 PID: 843 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1184.048782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.058130] Call Trace: [ 1184.060719] dump_stack+0x1b2/0x281 [ 1184.064350] should_fail.cold+0x10a/0x149 [ 1184.068497] should_failslab+0xd6/0x130 [ 1184.072474] kmem_cache_alloc_node+0x54/0x410 [ 1184.076969] __alloc_skb+0x5c/0x510 [ 1184.080594] create_monitor_event+0x65a/0x800 [ 1184.085085] hci_sock_bind+0x6d7/0x12b0 [ 1184.089066] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1184.093211] ? security_socket_bind+0x83/0xb0 [ 1184.097707] SyS_bind+0x174/0x1f0 [ 1184.101157] ? SyS_socketpair+0x480/0x480 [ 1184.105299] ? wait_for_completion_io+0x10/0x10 [ 1184.109963] ? vfs_write+0x319/0x4d0 [ 1184.113676] ? fput_many+0xe/0x140 [ 1184.117212] ? SyS_write+0x14d/0x210 [ 1184.120922] ? SyS_read+0x210/0x210 [ 1184.124545] ? __do_page_fault+0x159/0xad0 [ 1184.128771] ? do_syscall_64+0x4c/0x640 [ 1184.132742] ? SyS_socketpair+0x480/0x480 [ 1184.136888] do_syscall_64+0x1d5/0x640 [ 1184.140779] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1184.145961] RIP: 0033:0x7efd5c237109 [ 1184.149660] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1184.157362] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1184.164625] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 07:44:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 4) 07:44:39 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x1}, 0x6) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "12e3216fdbeccb11d5290438d8a6a28347e44cc0a810016f8569154de7d9dfe1ea46c9a96e1f1b2f079e1e0cea0090d9bdfc0c4d77936af6e3f41d7516420ce8", 0x26}, 0x48, 0xfffffffffffffffc) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) [ 1184.171909] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1184.179173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1184.186437] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1184.284373] FAULT_INJECTION: forcing a failure. [ 1184.284373] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.299999] CPU: 1 PID: 867 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1184.307722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.317072] Call Trace: [ 1184.319663] dump_stack+0x1b2/0x281 [ 1184.323288] should_fail.cold+0x10a/0x149 [ 1184.327417] should_failslab+0xd6/0x130 [ 1184.331373] kmem_cache_alloc+0x28e/0x3c0 [ 1184.335505] getname_flags+0xc8/0x550 [ 1184.339284] user_path_at_empty+0x2a/0x50 [ 1184.343504] do_mount+0x118/0x2a30 [ 1184.347027] ? copy_mount_string+0x40/0x40 [ 1184.351246] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1184.356247] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1184.361068] ? copy_mnt_ns+0xa30/0xa30 [ 1184.364934] ? copy_mount_options+0x1fa/0x2f0 [ 1184.369413] ? copy_mnt_ns+0xa30/0xa30 [ 1184.373291] SyS_mount+0xa8/0x120 [ 1184.376727] ? copy_mnt_ns+0xa30/0xa30 [ 1184.380590] do_syscall_64+0x1d5/0x640 [ 1184.384458] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1184.389622] RIP: 0033:0x7f0f45693109 [ 1184.393311] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1184.400997] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1184.408245] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1184.415491] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1184.422736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1184.429979] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1184.505784] Bluetooth: hci2 command 0x0401 tx timeout 07:44:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:39 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "a439ae6bd9210f76a1f904f20c49435097d6d29e44fc1bdaf5da4935408c04174a4812a6a6f126bbbf642a21b5fcb35c383895e8bb338f1a7a8edd0e3d36524f", 0x30}, 0x48, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x8000) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "2ead590ac2bbd908e63159728503faab22e5f3f1c58dcc12a5bb63a1004f8d84841025530b8e95a4f9df6e37d6667b52fc5952b5965ec104ff2f00295d442e63", 0x15}, 0x48, r1) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r5) 07:44:39 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0xfffffffffffffdb1) 07:44:39 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 14) 07:44:39 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x1}, 0x6) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "12e3216fdbeccb11d5290438d8a6a28347e44cc0a810016f8569154de7d9dfe1ea46c9a96e1f1b2f079e1e0cea0090d9bdfc0c4d77936af6e3f41d7516420ce8", 0x26}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x3, 0x1}, 0x6) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "12e3216fdbeccb11d5290438d8a6a28347e44cc0a810016f8569154de7d9dfe1ea46c9a96e1f1b2f079e1e0cea0090d9bdfc0c4d77936af6e3f41d7516420ce8", 0x26}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) (async) 07:44:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 5) [ 1184.630281] FAULT_INJECTION: forcing a failure. [ 1184.630281] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.641643] CPU: 1 PID: 884 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1184.649349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.650814] FAULT_INJECTION: forcing a failure. [ 1184.650814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1184.658701] Call Trace: [ 1184.673057] dump_stack+0x1b2/0x281 [ 1184.676667] should_fail.cold+0x10a/0x149 [ 1184.680798] should_failslab+0xd6/0x130 [ 1184.684754] kmem_cache_alloc_node_trace+0x58/0x400 [ 1184.689758] __kmalloc_node_track_caller+0x38/0x70 [ 1184.694688] __alloc_skb+0x96/0x510 [ 1184.698298] create_monitor_event+0x65a/0x800 [ 1184.702771] hci_sock_bind+0x6d7/0x12b0 [ 1184.706724] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1184.710857] ? security_socket_bind+0x83/0xb0 [ 1184.715332] SyS_bind+0x174/0x1f0 [ 1184.718767] ? SyS_socketpair+0x480/0x480 [ 1184.722895] ? wait_for_completion_io+0x10/0x10 [ 1184.727541] ? vfs_write+0x319/0x4d0 [ 1184.731231] ? fput_many+0xe/0x140 [ 1184.734749] ? SyS_write+0x14d/0x210 [ 1184.738441] ? SyS_read+0x210/0x210 [ 1184.742047] ? __do_page_fault+0x159/0xad0 [ 1184.746285] ? do_syscall_64+0x4c/0x640 [ 1184.750236] ? SyS_socketpair+0x480/0x480 [ 1184.754544] do_syscall_64+0x1d5/0x640 [ 1184.758413] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1184.763581] RIP: 0033:0x7efd5c237109 [ 1184.767268] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 07:44:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 15) [ 1184.774953] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1184.782199] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1184.789445] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1184.796695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1184.803945] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1184.811207] CPU: 0 PID: 895 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1184.818911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.828261] Call Trace: 07:44:40 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "a439ae6bd9210f76a1f904f20c49435097d6d29e44fc1bdaf5da4935408c04174a4812a6a6f126bbbf642a21b5fcb35c383895e8bb338f1a7a8edd0e3d36524f", 0x30}, 0x48, r0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x8000) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "2ead590ac2bbd908e63159728503faab22e5f3f1c58dcc12a5bb63a1004f8d84841025530b8e95a4f9df6e37d6667b52fc5952b5965ec104ff2f00295d442e63", 0x15}, 0x48, r1) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r5) [ 1184.830854] dump_stack+0x1b2/0x281 [ 1184.834490] should_fail.cold+0x10a/0x149 [ 1184.838644] __alloc_pages_nodemask+0x22c/0x2720 [ 1184.843409] ? __save_stack_trace+0x63/0x160 [ 1184.847835] ? is_bpf_text_address+0x91/0x150 [ 1184.852337] ? __lock_acquire+0x5fc/0x3f20 [ 1184.856579] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1184.861504] ? kernel_text_address+0xbd/0xf0 [ 1184.865910] ? __kernel_text_address+0x9/0x30 [ 1184.870408] ? depot_save_stack+0x10d/0x3f0 [ 1184.874730] ? kasan_kmalloc+0x139/0x160 [ 1184.878021] FAULT_INJECTION: forcing a failure. [ 1184.878021] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.878788] cache_grow_begin+0x91/0x700 [ 1184.878798] ? fs_reclaim_release+0xd0/0x110 [ 1184.878810] ? check_preemption_disabled+0x35/0x240 [ 1184.878824] cache_alloc_refill+0x273/0x350 [ 1184.907710] kmem_cache_alloc+0x333/0x3c0 [ 1184.911840] getname_flags+0xc8/0x550 [ 1184.915627] user_path_at_empty+0x2a/0x50 [ 1184.919758] do_mount+0x118/0x2a30 [ 1184.923281] ? copy_mount_string+0x40/0x40 [ 1184.927497] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1184.932492] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1184.937312] ? copy_mnt_ns+0xa30/0xa30 [ 1184.941273] ? copy_mount_options+0x1fa/0x2f0 [ 1184.945745] ? copy_mnt_ns+0xa30/0xa30 [ 1184.949613] SyS_mount+0xa8/0x120 [ 1184.953047] ? copy_mnt_ns+0xa30/0xa30 [ 1184.956916] do_syscall_64+0x1d5/0x640 [ 1184.960788] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1184.965963] RIP: 0033:0x7f0f45693109 [ 1184.969651] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1184.977338] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1184.984587] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1184.991834] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1184.999097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.006345] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1185.013608] CPU: 1 PID: 900 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1185.021313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.030657] Call Trace: [ 1185.033252] dump_stack+0x1b2/0x281 [ 1185.036894] should_fail.cold+0x10a/0x149 [ 1185.041039] should_failslab+0xd6/0x130 [ 1185.045012] kmem_cache_alloc_node+0x54/0x410 [ 1185.049503] __alloc_skb+0x5c/0x510 [ 1185.053131] create_monitor_event+0x7e/0x800 [ 1185.057537] hci_sock_bind+0xc1b/0x12b0 [ 1185.061517] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1185.065664] ? security_socket_bind+0x83/0xb0 [ 1185.070157] SyS_bind+0x174/0x1f0 [ 1185.073604] ? SyS_socketpair+0x480/0x480 [ 1185.077749] ? wait_for_completion_io+0x10/0x10 [ 1185.082507] ? vfs_write+0x319/0x4d0 [ 1185.086217] ? fput_many+0xe/0x140 [ 1185.089753] ? SyS_write+0x14d/0x210 [ 1185.093464] ? SyS_read+0x210/0x210 [ 1185.097085] ? __do_page_fault+0x159/0xad0 [ 1185.101321] ? do_syscall_64+0x4c/0x640 [ 1185.105293] ? SyS_socketpair+0x480/0x480 [ 1185.109443] do_syscall_64+0x1d5/0x640 [ 1185.113332] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1185.118523] RIP: 0033:0x7efd5c237109 [ 1185.122227] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 07:44:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x31, 0x63, 0x0, 0x30, 0x31, 0x64, 0x32, 0x32, 0x34, 0x30, 0x38, 0x32, 0x66, 0x37, 0x33]}, &(0x7f0000000140)={0x0, "2bee47f3a7f1bb8a83fc922fa86e34c84dba496b498b0c3899119a0ac427583308015c4a798d41244800a4aeea9830f91f5433d09bb34da115e3597c6d3ed041", 0x2f}, 0x48, 0xfffffffffffffffe) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5f) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0xfffffffffffffdb1) 07:44:40 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r0, 0x0, &(0x7f00000005c0)) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0xfffffffffffffdb1) 07:44:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x31, 0x63, 0x0, 0x30, 0x31, 0x64, 0x32, 0x32, 0x34, 0x30, 0x38, 0x32, 0x66, 0x37, 0x33]}, &(0x7f0000000140)={0x0, "2bee47f3a7f1bb8a83fc922fa86e34c84dba496b498b0c3899119a0ac427583308015c4a798d41244800a4aeea9830f91f5433d09bb34da115e3597c6d3ed041", 0x2f}, 0x48, 0xfffffffffffffffe) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5f) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) [ 1185.129931] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1185.137190] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1185.144456] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.151719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1185.158983] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:40 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:40 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdb61703e540021d822050000060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc8d0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$bt_hci(r1, &(0x7f00000000c0)={0x1, @exit_sniff_mode={{0x804, 0x2}, {0xc9}}}, 0x6) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 07:44:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 16) 07:44:40 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "a439ae6bd9210f76a1f904f20c49435097d6d29e44fc1bdaf5da4935408c04174a4812a6a6f126bbbf642a21b5fcb35c383895e8bb338f1a7a8edd0e3d36524f", 0x30}, 0x48, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x8000) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "2ead590ac2bbd908e63159728503faab22e5f3f1c58dcc12a5bb63a1004f8d84841025530b8e95a4f9df6e37d6667b52fc5952b5965ec104ff2f00295d442e63", 0x15}, 0x48, r1) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1b}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r5) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "a439ae6bd9210f76a1f904f20c49435097d6d29e44fc1bdaf5da4935408c04174a4812a6a6f126bbbf642a21b5fcb35c383895e8bb338f1a7a8edd0e3d36524f", 0x30}, 0x48, r0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x8000) (async) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000140)={0x0, "2ead590ac2bbd908e63159728503faab22e5f3f1c58dcc12a5bb63a1004f8d84841025530b8e95a4f9df6e37d6667b52fc5952b5965ec104ff2f00295d442e63", 0x15}, 0x48, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1b}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r5) (async) 07:44:40 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x30, 0x31, 0x63, 0x0, 0x30, 0x31, 0x64, 0x32, 0x32, 0x34, 0x30, 0x38, 0x32, 0x66, 0x37, 0x33]}, &(0x7f0000000140)={0x0, "2bee47f3a7f1bb8a83fc922fa86e34c84dba496b498b0c3899119a0ac427583308015c4a798d41244800a4aeea9830f91f5433d09bb34da115e3597c6d3ed041", 0x2f}, 0x48, 0xfffffffffffffffe) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x5f) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:40 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 6) 07:44:40 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @auto=[0x37, 0x64, 0x36, 0x34, 0x65, 0x0, 0x63, 0x0, 0x37, 0x32, 0x85c67ee9cbfed4ea, 0x32, 0x36, 0x34, 0x64, 0x35]}, &(0x7f0000000380)={0x0, "1cd6d88381f359b1f3768e2f9476d0d80b19fb692bdde9e433f8c80333c2f45bed7dd5289d6e0b772b391be13e85ab9bb3c3f1a81e8402021a401330822ebf07", 0x28}, 0x48, r0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x31, 0xc2, 0x37, 0x30, 0x34, 0x65, 0x66, 0x35, 0x39, 0x60, 0x61, 0x63, 0x38, 0x63, 0x61]}, &(0x7f00000001c0)={0x0, "618974e7dda4f791474038d16fd83ce85bedefef819e10df6fada3c45579ca9294bd70da5987e6afde53ad121963ef013e615a5b0c193173a5ae062bca92494e", 0x12}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) [ 1185.507229] FAULT_INJECTION: forcing a failure. [ 1185.507229] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.518688] CPU: 1 PID: 940 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1185.526396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:44:41 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdb61703e540021d822050000060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc8d0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$bt_hci(r1, &(0x7f00000000c0)={0x1, @exit_sniff_mode={{0x804, 0x2}, {0xc9}}}, 0x6) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 1185.535776] Call Trace: [ 1185.535792] dump_stack+0x1b2/0x281 [ 1185.535808] should_fail.cold+0x10a/0x149 [ 1185.535821] should_failslab+0xd6/0x130 [ 1185.535834] kmem_cache_alloc_node_trace+0x58/0x400 [ 1185.535848] __kmalloc_node_track_caller+0x38/0x70 [ 1185.535859] __alloc_skb+0x96/0x510 [ 1185.535873] create_monitor_event+0x7e/0x800 [ 1185.535889] hci_sock_bind+0xc1b/0x12b0 [ 1185.535899] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1185.535909] ? security_socket_bind+0x83/0xb0 [ 1185.535921] SyS_bind+0x174/0x1f0 07:44:41 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @auto=[0x37, 0x64, 0x36, 0x34, 0x65, 0x0, 0x63, 0x0, 0x37, 0x32, 0x85c67ee9cbfed4ea, 0x32, 0x36, 0x34, 0x64, 0x35]}, &(0x7f0000000380)={0x0, "1cd6d88381f359b1f3768e2f9476d0d80b19fb692bdde9e433f8c80333c2f45bed7dd5289d6e0b772b391be13e85ab9bb3c3f1a81e8402021a401330822ebf07", 0x28}, 0x48, r0) (async) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x31, 0xc2, 0x37, 0x30, 0x34, 0x65, 0x66, 0x35, 0x39, 0x60, 0x61, 0x63, 0x38, 0x63, 0x61]}, &(0x7f00000001c0)={0x0, "618974e7dda4f791474038d16fd83ce85bedefef819e10df6fada3c45579ca9294bd70da5987e6afde53ad121963ef013e615a5b0c193173a5ae062bca92494e", 0x12}, 0x48, 0xfffffffffffffffc) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) [ 1185.535930] ? SyS_socketpair+0x480/0x480 [ 1185.535941] ? wait_for_completion_io+0x10/0x10 [ 1185.535952] ? vfs_write+0x319/0x4d0 [ 1185.535962] ? fput_many+0xe/0x140 [ 1185.535971] ? SyS_write+0x14d/0x210 [ 1185.535981] ? SyS_read+0x210/0x210 [ 1185.535991] ? __do_page_fault+0x159/0xad0 [ 1185.536001] ? do_syscall_64+0x4c/0x640 [ 1185.536009] ? SyS_socketpair+0x480/0x480 [ 1185.536019] do_syscall_64+0x1d5/0x640 [ 1185.536034] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1185.536042] RIP: 0033:0x7efd5c237109 [ 1185.536047] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1185.536058] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1185.536063] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1185.536069] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.536074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1185.536079] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1185.564508] FAULT_INJECTION: forcing a failure. 07:44:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 17) 07:44:41 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @auto=[0x37, 0x64, 0x36, 0x34, 0x65, 0x0, 0x63, 0x0, 0x37, 0x32, 0x85c67ee9cbfed4ea, 0x32, 0x36, 0x34, 0x64, 0x35]}, &(0x7f0000000380)={0x0, "1cd6d88381f359b1f3768e2f9476d0d80b19fb692bdde9e433f8c80333c2f45bed7dd5289d6e0b772b391be13e85ab9bb3c3f1a81e8402021a401330822ebf07", 0x28}, 0x48, r0) (async) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f00000000c0)=0x2, &(0x7f0000000100)=0x4) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @auto=[0x35, 0x31, 0xc2, 0x37, 0x30, 0x34, 0x65, 0x66, 0x35, 0x39, 0x60, 0x61, 0x63, 0x38, 0x63, 0x61]}, &(0x7f00000001c0)={0x0, "618974e7dda4f791474038d16fd83ce85bedefef819e10df6fada3c45579ca9294bd70da5987e6afde53ad121963ef013e615a5b0c193173a5ae062bca92494e", 0x12}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0x1}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:41 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 7) [ 1185.564508] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.717922] CPU: 1 PID: 946 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1185.725633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.734978] Call Trace: [ 1185.737567] dump_stack+0x1b2/0x281 [ 1185.741211] should_fail.cold+0x10a/0x149 [ 1185.741226] should_failslab+0xd6/0x130 [ 1185.741238] kmem_cache_alloc+0x28e/0x3c0 [ 1185.741251] alloc_vfsmnt+0x23/0x7f0 [ 1185.741261] ? _raw_read_unlock+0x29/0x40 [ 1185.741272] vfs_kern_mount.part.0+0x27/0x470 [ 1185.741284] do_mount+0xe65/0x2a30 [ 1185.741301] ? copy_mount_string+0x40/0x40 [ 1185.741313] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1185.741323] ? copy_mnt_ns+0xa30/0xa30 [ 1185.741334] ? copy_mount_options+0x1fa/0x2f0 [ 1185.741343] ? copy_mnt_ns+0xa30/0xa30 [ 1185.741353] SyS_mount+0xa8/0x120 [ 1185.741361] ? copy_mnt_ns+0xa30/0xa30 [ 1185.741373] do_syscall_64+0x1d5/0x640 [ 1185.741385] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1185.741393] RIP: 0033:0x7f0f45693109 [ 1185.741398] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1185.741408] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1185.741414] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1185.741419] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1185.741424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.741429] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1185.768173] FAULT_INJECTION: forcing a failure. [ 1185.768173] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.768184] CPU: 1 PID: 979 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1185.768190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.768193] Call Trace: [ 1185.768207] dump_stack+0x1b2/0x281 [ 1185.768223] should_fail.cold+0x10a/0x149 [ 1185.768237] should_failslab+0xd6/0x130 [ 1185.768249] kmem_cache_alloc_node+0x54/0x410 [ 1185.768262] __alloc_skb+0x5c/0x510 [ 1185.768275] create_monitor_event+0x3a1/0x800 [ 1185.768285] hci_sock_bind+0x786/0x12b0 [ 1185.768295] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1185.768305] ? security_socket_bind+0x83/0xb0 [ 1185.768316] SyS_bind+0x174/0x1f0 [ 1185.768325] ? SyS_socketpair+0x480/0x480 [ 1185.768336] ? wait_for_completion_io+0x10/0x10 [ 1185.768345] ? vfs_write+0x319/0x4d0 [ 1185.768355] ? fput_many+0xe/0x140 [ 1185.768364] ? SyS_write+0x14d/0x210 [ 1185.768373] ? SyS_read+0x210/0x210 [ 1185.768382] ? __do_page_fault+0x159/0xad0 [ 1185.768391] ? do_syscall_64+0x4c/0x640 [ 1185.768400] ? SyS_socketpair+0x480/0x480 [ 1185.768409] do_syscall_64+0x1d5/0x640 [ 1185.768423] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1185.768431] RIP: 0033:0x7efd5c237109 [ 1185.768437] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1185.768446] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1185.768452] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1185.768457] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1185.768463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1185.768470] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1185.828355] FAULT_INJECTION: forcing a failure. [ 1185.828355] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.828367] CPU: 0 PID: 988 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1185.828373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.828376] Call Trace: [ 1185.828389] dump_stack+0x1b2/0x281 [ 1185.828405] should_fail.cold+0x10a/0x149 [ 1185.828419] should_failslab+0xd6/0x130 [ 1185.828432] __kmalloc_track_caller+0x2bc/0x400 [ 1185.828443] ? kstrdup_const+0x35/0x60 [ 1185.828451] ? lock_downgrade+0x740/0x740 [ 1185.828462] kstrdup+0x36/0x70 [ 1185.828472] kstrdup_const+0x35/0x60 [ 1185.828482] alloc_vfsmnt+0xe0/0x7f0 [ 1185.828490] ? _raw_read_unlock+0x29/0x40 [ 1185.828500] vfs_kern_mount.part.0+0x27/0x470 [ 1185.828510] do_mount+0xe65/0x2a30 [ 1185.828525] ? copy_mount_string+0x40/0x40 [ 1185.828536] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1185.828547] ? copy_mnt_ns+0xa30/0xa30 [ 1185.828558] ? copy_mount_options+0x1fa/0x2f0 [ 1185.828567] ? copy_mnt_ns+0xa30/0xa30 [ 1185.828577] SyS_mount+0xa8/0x120 [ 1185.828585] ? copy_mnt_ns+0xa30/0xa30 [ 1185.828596] do_syscall_64+0x1d5/0x640 [ 1185.828610] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1185.828617] RIP: 0033:0x7f0f45693109 [ 1185.828622] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1185.828633] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1185.828638] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1185.828644] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1185.828649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1185.828655] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 07:44:41 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 18) 07:44:41 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x420282, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @auto=[0x62, 0x64, 0x66, 0x36, 0x31, 0x37, 0x66, 0x35, 0x35, 0x66, 0x35, 0x61, 0x61, 0x66, 0x30, 0x63]}, &(0x7f0000000100)={0x0, "5aff694602cd1fda3dc80fd42ebf2c538329b1cfdfb5914b0494eb93e3f405d640e3f1148974a9b447f22524107a91bf0ed1003452262b9a7131d76a32726dad", 0x2e}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 07:44:41 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 8) 07:44:41 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdb61703e540021d822050000060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc8d0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$bt_hci(r1, &(0x7f00000000c0)={0x1, @exit_sniff_mode={{0x804, 0x2}, {0xc9}}}, 0x6) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$SEG6(0x0, r0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdb61703e540021d822050000060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc8d0) (async) pipe(&(0x7f0000000000)) (async) write$bt_hci(r1, &(0x7f00000000c0)={0x1, @exit_sniff_mode={{0x804, 0x2}, {0xc9}}}, 0x6) (async) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) 07:44:41 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @auto=[0x62, 0x64, 0x66, 0x36, 0x31, 0x37, 0x66, 0x35, 0x35, 0x66, 0x35, 0x61, 0x61, 0x66, 0x30, 0x63]}, &(0x7f0000000100)={0x0, "5aff694602cd1fda3dc80fd42ebf2c538329b1cfdfb5914b0494eb93e3f405d640e3f1148974a9b447f22524107a91bf0ed1003452262b9a7131d76a32726dad", 0x2e}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) [ 1186.471501] FAULT_INJECTION: forcing a failure. [ 1186.471501] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.482859] CPU: 1 PID: 1007 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1186.490806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.500156] Call Trace: [ 1186.502766] dump_stack+0x1b2/0x281 [ 1186.506419] should_fail.cold+0x10a/0x149 [ 1186.506432] should_failslab+0xd6/0x130 [ 1186.514554] kmem_cache_alloc_node_trace+0x58/0x400 [ 1186.519576] __kmalloc_node_track_caller+0x38/0x70 [ 1186.524507] __alloc_skb+0x96/0x510 [ 1186.528135] create_monitor_event+0x3a1/0x800 [ 1186.532282] FAULT_INJECTION: forcing a failure. [ 1186.532282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1186.532638] hci_sock_bind+0x786/0x12b0 [ 1186.548376] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1186.552511] ? security_socket_bind+0x83/0xb0 [ 1186.556993] SyS_bind+0x174/0x1f0 [ 1186.560428] ? SyS_socketpair+0x480/0x480 [ 1186.564561] ? wait_for_completion_io+0x10/0x10 [ 1186.569209] ? vfs_write+0x319/0x4d0 [ 1186.572903] ? fput_many+0xe/0x140 [ 1186.576426] ? SyS_write+0x14d/0x210 [ 1186.580124] ? SyS_read+0x210/0x210 [ 1186.583734] ? __do_page_fault+0x159/0xad0 [ 1186.587948] ? do_syscall_64+0x4c/0x640 [ 1186.591906] ? SyS_socketpair+0x480/0x480 [ 1186.596033] do_syscall_64+0x1d5/0x640 [ 1186.599907] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1186.606573] RIP: 0033:0x7efd5c237109 [ 1186.610270] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1186.617965] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1186.625235] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1186.632486] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.639736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1186.647120] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1186.654401] CPU: 0 PID: 1012 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1186.662196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.671635] Call Trace: [ 1186.674244] dump_stack+0x1b2/0x281 [ 1186.677871] should_fail.cold+0x10a/0x149 [ 1186.682026] __alloc_pages_nodemask+0x22c/0x2720 [ 1186.686781] ? trace_hardirqs_on+0x10/0x10 [ 1186.691020] ? _find_next_bit+0xdb/0x100 [ 1186.695077] ? pcpu_alloc+0xbe0/0xf50 [ 1186.698888] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1186.703745] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1186.709200] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1186.714207] alloc_pages_current+0x155/0x260 [ 1186.718594] ? __lockdep_init_map+0x100/0x560 [ 1186.723071] get_zeroed_page+0x19/0x50 [ 1186.726944] mount_fs+0x1c7/0x2a0 [ 1186.730387] vfs_kern_mount.part.0+0x5b/0x470 [ 1186.734863] do_mount+0xe65/0x2a30 [ 1186.738394] ? copy_mount_string+0x40/0x40 [ 1186.742612] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1186.747633] ? copy_mnt_ns+0xa30/0xa30 [ 1186.751504] ? copy_mount_options+0x1fa/0x2f0 [ 1186.755982] ? copy_mnt_ns+0xa30/0xa30 [ 1186.759852] SyS_mount+0xa8/0x120 [ 1186.763278] ? copy_mnt_ns+0xa30/0xa30 [ 1186.767148] do_syscall_64+0x1d5/0x640 [ 1186.771025] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1186.776191] RIP: 0033:0x7f0f45693109 [ 1186.779874] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1186.787563] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1186.794839] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1186.802086] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1186.809336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:44:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r0, &(0x7f0000000040)={0x1, @le_create_cis={{0x2064, 0x11}, {0x4, [{0x7e4}, {0x9, 0x8000}, {0x1d95, 0x401}, {0x14, 0x1}]}}}, 0x15) 07:44:42 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 19) 07:44:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @auto=[0x62, 0x64, 0x66, 0x36, 0x31, 0x37, 0x66, 0x35, 0x35, 0x66, 0x35, 0x61, 0x61, 0x66, 0x30, 0x63]}, &(0x7f0000000100)={0x0, "5aff694602cd1fda3dc80fd42ebf2c538329b1cfdfb5914b0494eb93e3f405d640e3f1148974a9b447f22524107a91bf0ed1003452262b9a7131d76a32726dad", 0x2e}, 0x48, 0xfffffffffffffffb) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @auto=[0x62, 0x64, 0x66, 0x36, 0x31, 0x37, 0x66, 0x35, 0x35, 0x66, 0x35, 0x61, 0x61, 0x66, 0x30, 0x63]}, &(0x7f0000000100)={0x0, "5aff694602cd1fda3dc80fd42ebf2c538329b1cfdfb5914b0494eb93e3f405d640e3f1148974a9b447f22524107a91bf0ed1003452262b9a7131d76a32726dad", 0x2e}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) 07:44:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x420282, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x420282, 0x0) (async) bind$x25(r0, &(0x7f0000000000), 0x12) (async) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x3, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) 07:44:42 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 9) [ 1186.816588] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1186.870852] FAULT_INJECTION: forcing a failure. [ 1186.870852] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.882175] CPU: 0 PID: 1034 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1186.889974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.899323] Call Trace: [ 1186.901916] dump_stack+0x1b2/0x281 [ 1186.905550] should_fail.cold+0x10a/0x149 [ 1186.909701] should_failslab+0xd6/0x130 [ 1186.913677] kmem_cache_alloc_node+0x54/0x410 [ 1186.918175] __alloc_skb+0x5c/0x510 [ 1186.921799] create_monitor_event+0x65a/0x800 [ 1186.926294] hci_sock_bind+0x6d7/0x12b0 [ 1186.930268] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1186.934410] ? security_socket_bind+0x83/0xb0 [ 1186.938902] SyS_bind+0x174/0x1f0 [ 1186.942352] ? SyS_socketpair+0x480/0x480 [ 1186.946506] ? wait_for_completion_io+0x10/0x10 [ 1186.951180] ? vfs_write+0x319/0x4d0 [ 1186.954893] ? fput_many+0xe/0x140 [ 1186.958432] ? SyS_write+0x14d/0x210 [ 1186.962229] ? SyS_read+0x210/0x210 [ 1186.965856] ? __do_page_fault+0x159/0xad0 [ 1186.970094] ? do_syscall_64+0x4c/0x640 [ 1186.974065] ? SyS_socketpair+0x480/0x480 [ 1186.978214] do_syscall_64+0x1d5/0x640 [ 1186.982106] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1186.987288] RIP: 0033:0x7efd5c237109 [ 1186.990993] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1186.998698] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1187.005969] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1187.013235] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.020498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.027765] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1187.030256] FAULT_INJECTION: forcing a failure. [ 1187.030256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1187.056126] CPU: 1 PID: 1056 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1187.063952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.073299] Call Trace: [ 1187.075887] dump_stack+0x1b2/0x281 [ 1187.079520] should_fail.cold+0x10a/0x149 [ 1187.083675] __alloc_pages_nodemask+0x22c/0x2720 [ 1187.088421] ? trace_hardirqs_on+0x10/0x10 [ 1187.092634] ? _find_next_bit+0xdb/0x100 [ 1187.096680] ? pcpu_alloc+0xbe0/0xf50 [ 1187.100457] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1187.105284] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1187.110713] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1187.115707] alloc_pages_current+0x155/0x260 [ 1187.120094] ? __lockdep_init_map+0x100/0x560 [ 1187.124568] get_zeroed_page+0x19/0x50 [ 1187.128431] mount_fs+0x1c7/0x2a0 [ 1187.131861] vfs_kern_mount.part.0+0x5b/0x470 [ 1187.136331] do_mount+0xe65/0x2a30 [ 1187.139846] ? do_raw_spin_unlock+0x164/0x220 [ 1187.144318] ? copy_mount_string+0x40/0x40 [ 1187.148527] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1187.153519] ? copy_mnt_ns+0xa30/0xa30 [ 1187.157384] ? copy_mount_options+0x1fa/0x2f0 [ 1187.161855] ? copy_mnt_ns+0xa30/0xa30 [ 1187.165719] SyS_mount+0xa8/0x120 [ 1187.169149] ? copy_mnt_ns+0xa30/0xa30 [ 1187.173011] do_syscall_64+0x1d5/0x640 [ 1187.176881] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1187.182051] RIP: 0033:0x7f0f45693109 [ 1187.185746] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1187.193428] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1187.200672] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1187.207917] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1187.215162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1187.222406] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 07:44:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0xa3, 0x0, &(0x7f0000000080)}) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r5, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:42 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000080)=0xfff, 0x4) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 07:44:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x420282, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x420282, 0x0) (async) bind$x25(r0, &(0x7f0000000000), 0x12) (async) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x3, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) 07:44:42 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 20) 07:44:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) write$bt_hci(r0, &(0x7f0000000040)={0x1, @le_create_cis={{0x2064, 0x11}, {0x4, [{0x7e4}, {0x9, 0x8000}, {0x1d95, 0x401}, {0x14, 0x1}]}}}, 0x15) 07:44:42 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 10) [ 1187.322340] FAULT_INJECTION: forcing a failure. [ 1187.322340] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.326556] FAULT_INJECTION: forcing a failure. [ 1187.326556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1187.333739] CPU: 0 PID: 1070 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1187.353114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.363151] Call Trace: [ 1187.365723] dump_stack+0x1b2/0x281 [ 1187.369332] should_fail.cold+0x10a/0x149 [ 1187.373463] should_failslab+0xd6/0x130 [ 1187.377419] kmem_cache_alloc_node_trace+0x58/0x400 [ 1187.382417] __kmalloc_node_track_caller+0x38/0x70 [ 1187.387328] __alloc_skb+0x96/0x510 [ 1187.390935] create_monitor_event+0x65a/0x800 [ 1187.395408] hci_sock_bind+0x6d7/0x12b0 [ 1187.399361] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1187.403490] ? security_socket_bind+0x83/0xb0 [ 1187.407967] SyS_bind+0x174/0x1f0 [ 1187.411402] ? SyS_socketpair+0x480/0x480 [ 1187.415530] ? wait_for_completion_io+0x10/0x10 [ 1187.420180] ? vfs_write+0x319/0x4d0 [ 1187.423879] ? fput_many+0xe/0x140 [ 1187.427397] ? SyS_write+0x14d/0x210 [ 1187.431099] ? SyS_read+0x210/0x210 [ 1187.434708] ? __do_page_fault+0x159/0xad0 [ 1187.439268] ? do_syscall_64+0x4c/0x640 [ 1187.443246] ? SyS_socketpair+0x480/0x480 [ 1187.447379] do_syscall_64+0x1d5/0x640 [ 1187.451256] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1187.456431] RIP: 0033:0x7efd5c237109 [ 1187.460124] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1187.467928] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1187.475177] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1187.482423] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.489671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.496922] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1187.504282] CPU: 1 PID: 1073 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1187.512076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:44:42 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 21) 07:44:42 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x2240c0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000440)=@multiplanar_fd={0x400, 0x3, 0x4, 0x4000, 0x527, {}, {0x0, 0x8, 0x3f, 0xf, 0x8, 0x1, "c13d3799"}, 0x8, 0x4, {&(0x7f00000003c0)=[{0x200, 0x2, {r1}, 0x9}, {0xfffffffb, 0xffff, {}, 0x7ff}]}, 0x10000}) r2 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc08000ce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205faed0063531357010d00000000000000001f00", 0x2}, 0x48, 0xfffffffffffffffb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000500)=r5) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6cf4646cb97fc6671ebe015bef2394d682f02d8f44805e1bb0857892922f7bc233ab3bd670121fb996c47d40930a431fe2180c478cfb1bff66afb479e6092b54", 0x2e}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "a630c22814133e37c8b34a403f946eeddb36200d8e502a86cb39c7b7486f688470a3c49ecb53ad3111652c2591141ceeb6a12aff6378f22cfaa27bea1b761faa", 0x8001}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) [ 1187.521423] Call Trace: [ 1187.524012] dump_stack+0x1b2/0x281 [ 1187.527643] should_fail.cold+0x10a/0x149 [ 1187.531790] ? get_page_from_freelist+0xaf6/0x25a0 [ 1187.536720] __alloc_pages_nodemask+0x22c/0x2720 [ 1187.541472] ? lock_downgrade+0x740/0x740 [ 1187.545625] ? page_outside_zone_boundaries+0x1db/0x310 [ 1187.550987] ? __lock_acquire+0x5fc/0x3f20 [ 1187.555224] ? preempt_count_add+0xaf/0x170 [ 1187.559546] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1187.564395] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1187.566481] FAULT_INJECTION: forcing a failure. [ 1187.566481] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.569844] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1187.569856] ? __alloc_pages_nodemask+0x1a6e/0x2720 [ 1187.569870] cache_grow_begin+0x91/0x700 [ 1187.569880] ? fs_reclaim_release+0xd0/0x110 [ 1187.569892] ? check_preemption_disabled+0x35/0x240 [ 1187.569907] cache_alloc_refill+0x273/0x350 [ 1187.608778] kmem_cache_alloc+0x333/0x3c0 [ 1187.612912] getname_kernel+0x4e/0x340 [ 1187.616780] kern_path+0x1b/0x40 [ 1187.620127] lookup_bdev+0xc6/0x1c0 [ 1187.623738] ? bd_acquire+0x440/0x440 [ 1187.627529] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1187.632971] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1187.637980] blkdev_get_by_path+0x1b/0xa0 [ 1187.642122] mount_bdev+0x4c/0x360 [ 1187.645648] ? fuse_get_root_inode+0xc0/0xc0 [ 1187.650045] mount_fs+0x92/0x2a0 [ 1187.653400] vfs_kern_mount.part.0+0x5b/0x470 [ 1187.657882] do_mount+0xe65/0x2a30 [ 1187.661407] ? copy_mount_string+0x40/0x40 [ 1187.665633] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1187.670741] ? copy_mnt_ns+0xa30/0xa30 [ 1187.674610] ? copy_mount_options+0x1fa/0x2f0 [ 1187.679085] ? copy_mnt_ns+0xa30/0xa30 [ 1187.682955] SyS_mount+0xa8/0x120 [ 1187.686385] ? copy_mnt_ns+0xa30/0xa30 [ 1187.690263] do_syscall_64+0x1d5/0x640 [ 1187.694220] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1187.699389] RIP: 0033:0x7f0f45693109 [ 1187.703078] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1187.710764] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1187.718014] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1187.725263] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1187.732516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.739765] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1187.747028] CPU: 0 PID: 1087 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1187.754820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.764169] Call Trace: [ 1187.766756] dump_stack+0x1b2/0x281 [ 1187.770383] should_fail.cold+0x10a/0x149 07:44:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000080)=0xfff, 0x4) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 07:44:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) write$bt_hci(r0, &(0x7f0000000040)={0x1, @le_create_cis={{0x2064, 0x11}, {0x4, [{0x7e4}, {0x9, 0x8000}, {0x1d95, 0x401}, {0x14, 0x1}]}}}, 0x15) [ 1187.774529] should_failslab+0xd6/0x130 [ 1187.778505] kmem_cache_alloc_node+0x54/0x410 [ 1187.783003] __alloc_skb+0x5c/0x510 [ 1187.786630] create_monitor_event+0x7e/0x800 [ 1187.791045] hci_sock_bind+0xc1b/0x12b0 [ 1187.795024] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1187.799167] ? security_socket_bind+0x83/0xb0 [ 1187.803660] SyS_bind+0x174/0x1f0 [ 1187.807108] ? SyS_socketpair+0x480/0x480 [ 1187.811259] ? wait_for_completion_io+0x10/0x10 [ 1187.816017] ? vfs_write+0x319/0x4d0 [ 1187.819731] ? fput_many+0xe/0x140 07:44:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xa82, &(0x7f00000000c0)=0x4) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080)=0x6f8, 0x4) [ 1187.823269] ? SyS_write+0x14d/0x210 [ 1187.826980] ? SyS_read+0x210/0x210 [ 1187.830607] ? __do_page_fault+0x159/0xad0 [ 1187.834840] ? do_syscall_64+0x4c/0x640 [ 1187.838810] ? SyS_socketpair+0x480/0x480 [ 1187.842956] do_syscall_64+0x1d5/0x640 [ 1187.846845] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1187.852030] RIP: 0033:0x7efd5c237109 [ 1187.855734] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1187.863525] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 07:44:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000080)=0xfff, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 07:44:43 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 1187.870790] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1187.878061] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.885329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1187.892593] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 07:44:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x2240c0, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) (async) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000440)=@multiplanar_fd={0x400, 0x3, 0x4, 0x4000, 0x527, {}, {0x0, 0x8, 0x3f, 0xf, 0x8, 0x1, "c13d3799"}, 0x8, 0x4, {&(0x7f00000003c0)=[{0x200, 0x2, {r1}, 0x9}, {0xfffffffb, 0xffff, {}, 0x7ff}]}, 0x10000}) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc08000ce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205faed0063531357010d00000000000000001f00", 0x2}, 0x48, 0xfffffffffffffffb) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) (async) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000500)=r5) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6cf4646cb97fc6671ebe015bef2394d682f02d8f44805e1bb0857892922f7bc233ab3bd670121fb996c47d40930a431fe2180c478cfb1bff66afb479e6092b54", 0x2e}, 0x48, r2) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "a630c22814133e37c8b34a403f946eeddb36200d8e502a86cb39c7b7486f688470a3c49ecb53ad3111652c2591141ceeb6a12aff6378f22cfaa27bea1b761faa", 0x8001}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) 07:44:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xa82, &(0x7f00000000c0)=0x4) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080)=0x6f8, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xa82, &(0x7f00000000c0)=0x4) (async) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080)=0x6f8, 0x4) (async) 07:44:43 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 22) 07:44:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x2240c0, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000780), 0x0) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000440)=@multiplanar_fd={0x400, 0x3, 0x4, 0x4000, 0x527, {}, {0x0, 0x8, 0x3f, 0xf, 0x8, 0x1, "c13d3799"}, 0x8, 0x4, {&(0x7f00000003c0)=[{0x200, 0x2, {r1}, 0x9}, {0xfffffffb, 0xffff, {}, 0x7ff}]}, 0x10000}) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc08000ce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205faed0063531357010d00000000000000001f00", 0x2}, 0x48, 0xfffffffffffffffb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r4, 0x0, &(0x7f00000005c0)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000500)=r5) (async, rerun: 64) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "6cf4646cb97fc6671ebe015bef2394d682f02d8f44805e1bb0857892922f7bc233ab3bd670121fb996c47d40930a431fe2180c478cfb1bff66afb479e6092b54", 0x2e}, 0x48, r2) (async, rerun: 64) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "a630c22814133e37c8b34a403f946eeddb36200d8e502a86cb39c7b7486f688470a3c49ecb53ad3111652c2591141ceeb6a12aff6378f22cfaa27bea1b761faa", 0x8001}, 0x48, 0xfffffffffffffffc) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r3) (rerun: 32) [ 1187.992530] FAULT_INJECTION: forcing a failure. [ 1187.992530] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.003855] CPU: 1 PID: 1132 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1188.011645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.020997] Call Trace: [ 1188.023590] dump_stack+0x1b2/0x281 [ 1188.027219] should_fail.cold+0x10a/0x149 [ 1188.031369] should_failslab+0xd6/0x130 [ 1188.035343] kmem_cache_alloc_node_trace+0x58/0x400 07:44:43 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 11) 07:44:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xa82, &(0x7f00000000c0)=0x4) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080)=0x6f8, 0x4) 07:44:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x84800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:43 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xc4) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000000)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) [ 1188.040358] __kmalloc_node_track_caller+0x38/0x70 [ 1188.045287] __alloc_skb+0x96/0x510 [ 1188.048914] create_monitor_event+0x7e/0x800 [ 1188.053325] hci_sock_bind+0xc1b/0x12b0 [ 1188.057295] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1188.061441] ? security_socket_bind+0x83/0xb0 [ 1188.065932] SyS_bind+0x174/0x1f0 [ 1188.069387] ? SyS_socketpair+0x480/0x480 [ 1188.073531] ? wait_for_completion_io+0x10/0x10 [ 1188.078203] ? vfs_write+0x319/0x4d0 [ 1188.081920] ? fput_many+0xe/0x140 [ 1188.085453] ? SyS_write+0x14d/0x210 [ 1188.089165] ? SyS_read+0x210/0x210 [ 1188.092784] ? __do_page_fault+0x159/0xad0 [ 1188.097018] ? do_syscall_64+0x4c/0x640 [ 1188.100984] ? SyS_socketpair+0x480/0x480 [ 1188.105123] do_syscall_64+0x1d5/0x640 [ 1188.109009] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1188.114190] RIP: 0033:0x7efd5c237109 [ 1188.117145] FAULT_INJECTION: forcing a failure. [ 1188.117145] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.117884] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 07:44:43 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$vhost_msg(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/90, 0x5a, &(0x7f0000000100)=""/24, 0x2, 0x1}}, 0x48) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) write$vhost_msg_v2(r2, &(0x7f0000000380)={0x2, 0x0, {&(0x7f0000000240)=""/122, 0x7a, &(0x7f00000002c0)=""/186, 0x2, 0x1}}, 0x48) 07:44:43 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xc4) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000000)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:43 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x84800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x84800, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) (async) [ 1188.117895] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1188.117901] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1188.117907] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1188.117912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1188.117918] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1188.247744] CPU: 1 PID: 1145 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1188.255561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.264909] Call Trace: [ 1188.267500] dump_stack+0x1b2/0x281 [ 1188.271136] should_fail.cold+0x10a/0x149 [ 1188.275280] should_failslab+0xd6/0x130 [ 1188.279250] __kmalloc+0x2c1/0x400 [ 1188.282779] ? __list_lru_init+0x67/0x710 [ 1188.286904] __list_lru_init+0x67/0x710 [ 1188.290864] sget_userns+0x504/0xc10 [ 1188.294554] ? set_bdev_super+0x110/0x110 [ 1188.298677] ? ns_test_super+0x50/0x50 [ 1188.302541] ? set_bdev_super+0x110/0x110 [ 1188.306663] ? ns_test_super+0x50/0x50 [ 1188.310528] sget+0xd1/0x110 [ 1188.313526] mount_bdev+0xcd/0x360 [ 1188.317043] ? fuse_get_root_inode+0xc0/0xc0 [ 1188.321428] mount_fs+0x92/0x2a0 [ 1188.324774] vfs_kern_mount.part.0+0x5b/0x470 [ 1188.329259] do_mount+0xe65/0x2a30 [ 1188.332778] ? copy_mount_string+0x40/0x40 [ 1188.336987] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1188.341984] ? copy_mnt_ns+0xa30/0xa30 [ 1188.345846] ? copy_mount_options+0x1fa/0x2f0 [ 1188.350373] ? copy_mnt_ns+0xa30/0xa30 [ 1188.354236] SyS_mount+0xa8/0x120 [ 1188.357664] ? copy_mnt_ns+0xa30/0xa30 [ 1188.361532] do_syscall_64+0x1d5/0x640 [ 1188.365399] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1188.370562] RIP: 0033:0x7f0f45693109 [ 1188.374245] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1188.381928] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1188.389172] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1188.396415] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1188.403659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1188.410902] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 07:44:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r1, 0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000780), 0x0) read$FUSE(r0, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x284009, &(0x7f0000002800)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xcb}}, {@blksize={'blksize', 0x3d, 0x200}}, {}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}], [{@dont_measure}, {@context={'context', 0x3d, 'user_u'}}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_CAP_HYPERV_ENLIGHTENED_VMCS(r2, 0x4068aea3, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffd6e, 0xfffffffffffffff9) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, 0x0) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000780), 0x0) pipe2$watch_queue(&(0x7f0000000140), 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netrom(r6, 0x0, &(0x7f00000005c0)) ioctl$KVM_GET_SREGS(r6, 0x8138ae83, &(0x7f00000003c0)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @null, 0x4, 0x2, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:44:44 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) (fail_nth: 23) 07:44:44 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$vhost_msg(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/90, 0x5a, &(0x7f0000000100)=""/24, 0x2, 0x1}}, 0x48) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) write$vhost_msg_v2(r2, &(0x7f0000000380)={0x2, 0x0, {&(0x7f0000000240)=""/122, 0x7a, &(0x7f00000002c0)=""/186, 0x2, 0x1}}, 0x48) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$vhost_msg(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/90, 0x5a, &(0x7f0000000100)=""/24, 0x2, 0x1}}, 0x48) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) (async) write$vhost_msg_v2(r2, &(0x7f0000000380)={0x2, 0x0, {&(0x7f0000000240)=""/122, 0x7a, &(0x7f00000002c0)=""/186, 0x2, 0x1}}, 0x48) (async) 07:44:44 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x84800, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r1) 07:44:44 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xc4) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000000)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9", 0xfffffffc}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r2) 07:44:44 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}]}}) (fail_nth: 12) 07:44:44 executing program 4: accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@bcast, @bcast, @default, @bcast, @bcast]}, &(0x7f0000000140)=0x48) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f546d0aaea9ddfc083ccce7f3967c067dafd07e54b8a3b55aeeda9bf2f101205fa48023839106eb5250a5e3117e654f4c4ed0063531357010d57d2ef3bdc48c9"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000340), 0x0, 0x0, 0x0, r0) 07:44:44 executing program 2: openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$vhost_msg(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/90, 0x5a, &(0x7f0000000100)=""/24, 0x2, 0x1}}, 0x48) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) write$vhost_msg_v2(r2, &(0x7f0000000380)={0x2, 0x0, {&(0x7f0000000240)=""/122, 0x7a, &(0x7f00000002c0)=""/186, 0x2, 0x1}}, 0x48) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$vhost_msg(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/90, 0x5a, &(0x7f0000000100)=""/24, 0x2, 0x1}}, 0x48) (async) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) (async) write$vhost_msg_v2(r2, &(0x7f0000000380)={0x2, 0x0, {&(0x7f0000000240)=""/122, 0x7a, &(0x7f00000002c0)=""/186, 0x2, 0x1}}, 0x48) (async) [ 1188.837686] FAULT_INJECTION: forcing a failure. [ 1188.837686] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.861424] CPU: 0 PID: 1193 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1188.869238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.878590] Call Trace: [ 1188.881175] dump_stack+0x1b2/0x281 [ 1188.883472] FAULT_INJECTION: forcing a failure. [ 1188.883472] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.884801] should_fail.cold+0x10a/0x149 [ 1188.884818] should_failslab+0xd6/0x130 [ 1188.884834] __kmalloc+0x2c1/0x400 [ 1188.907621] ? register_shrinker+0x1ab/0x220 [ 1188.912012] register_shrinker+0x1ab/0x220 [ 1188.916231] sget_userns+0x9aa/0xc10 [ 1188.919926] ? set_bdev_super+0x110/0x110 [ 1188.924057] ? ns_test_super+0x50/0x50 [ 1188.927926] ? set_bdev_super+0x110/0x110 [ 1188.932064] ? ns_test_super+0x50/0x50 [ 1188.935931] sget+0xd1/0x110 [ 1188.938931] mount_bdev+0xcd/0x360 [ 1188.942453] ? fuse_get_root_inode+0xc0/0xc0 [ 1188.946843] mount_fs+0x92/0x2a0 [ 1188.950192] vfs_kern_mount.part.0+0x5b/0x470 [ 1188.954667] do_mount+0xe65/0x2a30 [ 1188.958192] ? copy_mount_string+0x40/0x40 [ 1188.962415] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1188.967419] ? copy_mnt_ns+0xa30/0xa30 [ 1188.971286] ? copy_mount_options+0x1fa/0x2f0 [ 1188.975767] ? copy_mnt_ns+0xa30/0xa30 [ 1188.979634] SyS_mount+0xa8/0x120 [ 1188.983069] ? copy_mnt_ns+0xa30/0xa30 [ 1188.986942] do_syscall_64+0x1d5/0x640 [ 1188.990818] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1188.995984] RIP: 0033:0x7f0f45693109 [ 1188.999671] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1189.007357] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1189.014615] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1189.021863] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1189.029113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1189.036361] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1189.043624] CPU: 1 PID: 1195 Comm: syz-executor.5 Not tainted 4.14.281-syzkaller #0 [ 1189.051415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.060757] Call Trace: [ 1189.063343] dump_stack+0x1b2/0x281 [ 1189.066971] should_fail.cold+0x10a/0x149 [ 1189.071120] should_failslab+0xd6/0x130 [ 1189.075094] kmem_cache_alloc_node+0x54/0x410 [ 1189.079590] __alloc_skb+0x5c/0x510 [ 1189.083215] create_monitor_event+0x3a1/0x800 [ 1189.087711] hci_sock_bind+0x786/0x12b0 [ 1189.091682] ? hci_sock_ioctl+0x6c0/0x6c0 [ 1189.095825] ? security_socket_bind+0x83/0xb0 [ 1189.096832] ------------[ cut here ]------------ [ 1189.100312] SyS_bind+0x174/0x1f0 [ 1189.100324] ? SyS_socketpair+0x480/0x480 [ 1189.105152] WARNING: CPU: 0 PID: 1193 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 1189.108581] ? wait_for_completion_io+0x10/0x10 [ 1189.112870] Kernel panic - not syncing: panic_on_warn set ... [ 1189.112870] [ 1189.120641] ? vfs_write+0x319/0x4d0 [ 1189.136299] ? fput_many+0xe/0x140 [ 1189.139818] ? SyS_write+0x14d/0x210 [ 1189.143509] ? SyS_read+0x210/0x210 [ 1189.147118] ? __do_page_fault+0x159/0xad0 [ 1189.151330] ? do_syscall_64+0x4c/0x640 [ 1189.155286] ? SyS_socketpair+0x480/0x480 [ 1189.159416] do_syscall_64+0x1d5/0x640 [ 1189.163287] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1189.168454] RIP: 0033:0x7efd5c237109 [ 1189.172143] RSP: 002b:00007efd5abac168 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1189.179829] RAX: ffffffffffffffda RBX: 00007efd5c349f60 RCX: 00007efd5c237109 [ 1189.187076] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000004 [ 1189.194325] RBP: 00007efd5abac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1189.201574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1189.208820] R13: 00007fff3bd23dff R14: 00007efd5abac300 R15: 0000000000022000 [ 1189.216083] CPU: 0 PID: 1193 Comm: syz-executor.3 Not tainted 4.14.281-syzkaller #0 [ 1189.223870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.233214] Call Trace: [ 1189.235802] dump_stack+0x1b2/0x281 [ 1189.239431] panic+0x1f9/0x42d [ 1189.242618] ? add_taint.cold+0x16/0x16 [ 1189.246592] ? kill_block_super+0xbe/0xe0 [ 1189.250741] ? __warn.cold+0x5/0x44 [ 1189.254366] ? kill_block_super+0xbe/0xe0 [ 1189.258507] __warn.cold+0x20/0x44 [ 1189.262044] ? ist_end_non_atomic+0x10/0x10 [ 1189.266361] ? kill_block_super+0xbe/0xe0 [ 1189.270503] report_bug+0x208/0x250 [ 1189.274129] do_error_trap+0x195/0x2d0 [ 1189.278015] ? math_error+0x2d0/0x2d0 [ 1189.281810] ? retint_kernel+0x2d/0x2d [ 1189.285687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1189.290509] invalid_op+0x1b/0x40 [ 1189.293944] RIP: 0010:kill_block_super+0xbe/0xe0 [ 1189.298670] RSP: 0018:ffff88808da8fbc8 EFLAGS: 00010246 [ 1189.304010] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900071f5000 [ 1189.311256] RDX: 0000000000040000 RSI: ffffffff81875a3e RDI: ffff8880b1e1bb70 [ 1189.318597] RBP: ffff8880a1ed8180 R08: ffffffff8b9bc3f0 R09: 0000000000000001 [ 1189.325871] R10: 0000000000000000 R11: ffff88809f4926c0 R12: ffff8880b1e1b6c0 [ 1189.333113] R13: ffffffff891e9e70 R14: ffffffff88f45500 R15: dffffc0000000000 [ 1189.340372] ? kill_block_super+0xbe/0xe0 [ 1189.344524] ? kill_block_super+0xbe/0xe0 [ 1189.348651] deactivate_locked_super+0x6c/0xd0 [ 1189.353211] sget_userns+0x9c4/0xc10 [ 1189.356900] ? set_bdev_super+0x110/0x110 [ 1189.361025] ? ns_test_super+0x50/0x50 [ 1189.364898] ? set_bdev_super+0x110/0x110 [ 1189.369021] ? ns_test_super+0x50/0x50 [ 1189.372881] sget+0xd1/0x110 [ 1189.375876] mount_bdev+0xcd/0x360 [ 1189.379396] ? fuse_get_root_inode+0xc0/0xc0 [ 1189.383780] mount_fs+0x92/0x2a0 [ 1189.387129] vfs_kern_mount.part.0+0x5b/0x470 [ 1189.391600] do_mount+0xe65/0x2a30 [ 1189.395127] ? copy_mount_string+0x40/0x40 [ 1189.399352] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1189.404353] ? copy_mnt_ns+0xa30/0xa30 [ 1189.408215] ? copy_mount_options+0x1fa/0x2f0 [ 1189.412686] ? copy_mnt_ns+0xa30/0xa30 [ 1189.416547] SyS_mount+0xa8/0x120 [ 1189.419974] ? copy_mnt_ns+0xa30/0xa30 [ 1189.423862] do_syscall_64+0x1d5/0x640 [ 1189.427922] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1189.433094] RIP: 0033:0x7f0f45693109 [ 1189.436783] RSP: 002b:00007f0f44008168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1189.444573] RAX: ffffffffffffffda RBX: 00007f0f457a5f60 RCX: 00007f0f45693109 [ 1189.451823] RDX: 00000000200002c0 RSI: 0000000020000200 RDI: 00000000200001c0 [ 1189.459071] RBP: 00007f0f440081d0 R08: 0000000020000380 R09: 0000000000000000 [ 1189.466322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1189.473577] R13: 00007fff2be8beef R14: 00007f0f44008300 R15: 0000000000022000 [ 1189.481203] Kernel Offset: disabled [ 1189.484892] Rebooting in 86400 seconds..