d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="070000008001a001"], &(0x7f0000000080), 0x0) 10:26:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6b9}, 0x28) 10:26:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2da}, 0x28) 10:26:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x4c, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x4) poll(&(0x7f0000000040)=[{r0, 0x8000}, {r0, 0x4000}, {r0, 0x80}, {r0, 0x48}, {r0, 0x1}, {r0, 0x8}], 0x6, 0xda) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4f8}, 0x28) 10:26:31 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x80) read$eventfd(r0, &(0x7f0000000000), 0x8) 10:26:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x957}, 0x28) 10:26:31 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x40280) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x5) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x701}, 0x28) 10:26:31 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) write$apparmor_current(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030325e73797374656d76626f786e6574310073656c694e757800002f73656c696e75782f735c5e776c61d33073656c696e757800000000000000f9ffffff000000"], 0x61) r3 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x10) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000340)={"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"}) 10:26:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x12000, 0x0) 10:26:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x3, {0x7, 0x1b, 0x100000000109, 0x20001, 0x0, 0x2000}}, 0x50) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x1, &(0x7f0000000180)=0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000002"], &(0x7f0000000080), 0x0) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb48}, 0x28) 10:26:32 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)) read$eventfd(r0, &(0x7f0000000000), 0x8) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa13}, 0x28) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x521}, 0x28) 10:26:32 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = memfd_create(&(0x7f0000000180)='@em1posix_acl_accessGPLproc./(\x00', 0x7) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000200)=0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x81, 0x15, "0134089089b336197f99dc66584506f5b88d0be6d9f5bdc0b6c366ce10745d9afce0570dcebb1a16bbe11cf6ea802c1570642dd5f2cc179528d1bb9711acd01b03160d2b74bfd48d4ea855d24de7f39540cd74f8e4f98b31a88a715a4920a531d5450a957f229d1fe7e8ffce3ae53e113665bbe1ae4931b979"}, &(0x7f0000000140), 0x1400) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x848}, 0x28) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x135}, 0x28) 10:26:32 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)) read$eventfd(r0, &(0x7f0000000000), 0x8) 10:26:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xef5}, 0x28) 10:26:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9fc}, 0x28) 10:26:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@rand_addr=0x8, 0x4e22, 0x40, 0x4e21, 0x0, 0xa, 0x20, 0x80, 0x32, 0x0, r1}, {0x40000000, 0x3ff, 0x7, 0x5f, 0x6, 0x107b, 0x101, 0x3}, {0xffffffff7fffffff, 0x5, 0x4, 0xffffffffffff2c2c}, 0x1, 0x6e6bb6, 0x1, 0x0, 0x1, 0x3}, {{@in6=@remote, 0x4d3, 0xff}, 0x2, @in6=@mcast2, 0x0, 0x3, 0x1, 0x800, 0x7, 0x3, 0x400}}, 0xe8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x200000) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f00000000c0)=0x1) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r3, &(0x7f00000007c0), 0x1000) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:33 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000140)="c168dffd7b9a9b6643228ec89b7c4c46f0153f6234488dd25d2960") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/member\x00', 0x2, 0x0) syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x40004, 0x2000000003ffc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400000, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000440)=""/220, &(0x7f00000002c0)=0x42804e49a79d27d) r2 = gettid() ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x4, 0x3, 0x7f, 0x3, 0x1, 0x200}) ptrace$poke(0x5, r2, &(0x7f0000000180), 0x400) mlockall(0x1) syz_open_procfs(r2, &(0x7f0000000040)='statm\x00') socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) 10:26:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040,user_id=\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 10:26:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000002000001"], &(0x7f0000000080), 0x0) 10:26:33 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)) read$eventfd(r0, &(0x7f0000000000), 0x8) 10:26:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2a2}, 0x28) 10:26:33 executing program 4: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x200, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x501000, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x3, 0x0) mkdirat(r0, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d34303030303030303030303084686830303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c677e7c2a52e5152d60726f75705f696441", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x90) 10:26:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69653d11f8b874f686dd5f708e122b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000014330000000000000000000001000000000000002c000000000072ea8a6047983320000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000004d8bd24b490ba3d391007c8bb6122aa6e77b35df7de2051df56e0000e3e520498c8c780e8afdfaf6223bc3635c49292ae4f70e734ddccbc879a54c87237fdc0b48f5b7bcd338018f032d4141"], 0x90) 10:26:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xece}, 0x28) 10:26:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ptrace$getsig(0x4202, r1, 0x9, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0xfffffffffffffca1, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f00000001c0)={r3, 0x2}) 10:26:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0x400}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x3ff}}, 0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0xde0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbf}, 0x28) 10:26:33 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000100)=0x80) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 10:26:33 executing program 2: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000180)='net/udplite\x00') r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x800, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000040)) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000080)=""/238, 0xee) getsockopt$nfc_llcp(r2, 0x118, 0x6, &(0x7f0000000340)=""/4096, 0x1000) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) 10:26:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="07000000ffffff1f"], &(0x7f0000000080), 0x0) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x22c}, 0x28) 10:26:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2ac}, 0x28) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x83a}, 0x28) 10:26:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="5770004c54ab51e4cffeeee130186e5e1ec6a5c9707269747d58c5f058762f668e4136967ad5bbd5e8474db1a229bc92cf65d07e64b3c1966090cb3caa86a7cb0473"], &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file1\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000p000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x100000000, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000002c188cee10a039647a3ce98c9cd6e93e519636656e21ca21231e1c4cc9ec2a5b22e379136e816da4996cc2ec6c12abef0a17d11a0c2b02660ca9d7e35f34a7bb34e388e3ffc05eb28240c56812e28212bed753bcf51d4b57b2046da4d44e945b618304a7f0b9cc8cce77bbfe5d8377d1668a0bbabf0e6742394c3030d5600f3183ffe5ff2e1d84d70e9f719d39a30066f9026fa7a6007f16218d77fcdc063d19eba7f981ebd1849d4aede03909391600000000000000000000000000000000"], 0x90) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x253}, 0x28) 10:26:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4f8c, 0x22040) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x10, &(0x7f0000000080)={&(0x7f00000030c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x10, &(0x7f00000001c0)={&(0x7f0000000640)=""/4096, 0x1000, r2}}, 0x10) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe0f}, 0x28) 10:26:34 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, r1, 0x0) mlockall(0x1) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e20, @remote}, {0x0, @random="daa481201b95"}, 0x70, {0x2, 0x4e24, @rand_addr=0x7}, 'bridge_slave_1\x00'}) get_robust_list(0x0, &(0x7f0000000200)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x18) 10:26:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) 10:26:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080), 0x0) 10:26:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x8f}, 0x28) 10:26:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x717}, 0x28) 10:26:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x207}, 0x28) 10:26:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.origin\x00', &(0x7f0000000280)=""/52, 0xfffffffffffffeae) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x80d}, 0x28) 10:26:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x30800, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0xfffffffffffffffe) 10:26:35 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x62) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x292}, 0x28) 10:26:35 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f00000002c0)) r3 = getpid() get_robust_list(r3, &(0x7f0000000140)=&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) 10:26:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x71a}, 0x28) 10:26:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000005c0), 0x1000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000028}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x88, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7b9}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80000000}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x40) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000020001"], &(0x7f0000000080), 0x0) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3a9}, 0x28) 10:26:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e40)=ANY=[@ANYBLOB="73656375726974f0c20712792e2f6464762f66"], &(0x7f0000000e00)=""/52, 0x38a) read$FUSE(r0, &(0x7f00000040c0), 0xfffffe86) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x3, 0x0) sendmsg$rds(r1, &(0x7f0000000d80)={&(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000340)=""/164, 0xa4}, {&(0x7f0000000480)=""/83, 0x53}, {&(0x7f00000000c0)=""/7, 0x7}], 0x3, &(0x7f0000000b00)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x10000}, {&(0x7f0000000280)=""/13, 0xd}, &(0x7f0000000700)=[{&(0x7f00000005c0)=""/27, 0x1b}, {&(0x7f0000000600)=""/242, 0xf2}], 0x2, 0x4, 0x675}}, @mask_cswp={0x58, 0x114, 0x9, {{0xffff, 0x3}, &(0x7f0000000740), &(0x7f0000000780)=0x4, 0x4, 0x8, 0x1f, 0xff, 0xc, 0x10001}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000007c0)=""/238, 0xee}, &(0x7f00000008c0), 0x6}}, @mask_cswp={0x58, 0x114, 0x9, {{0x8, 0x21}, &(0x7f0000000900)=0x7fff, &(0x7f0000000940)=0xffffffffffffffff, 0x2, 0x0, 0x1, 0x9, 0x2c, 0x7a}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @zcopy_cookie={0x18}, @fadd={0x58, 0x114, 0x6, {{0x6, 0x9}, &(0x7f0000000980), &(0x7f00000009c0)=0x6, 0x17000000, 0xfffffff000000000, 0x8, 0x100000001, 0x0, 0x6}}, @rdma_dest={0x18, 0x114, 0x2, {0x9, 0x30eb}}, @mask_fadd={0x58, 0x114, 0x8, {{0x80000001, 0x401}, &(0x7f0000000a00)=0x2, &(0x7f0000000a40)=0x4, 0x8, 0x100000000, 0x10001, 0xffff, 0x45, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x3, 0xfc}, &(0x7f0000000a80), &(0x7f0000000ac0)=0x2, 0x200, 0xfffffffffffffcec, 0x3ff, 0x3, 0x10, 0x8}}], 0x278, 0x4008044}, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000008001000000000000002c000000000000000000000035a6000000000000000000000c5223d536fbc40000000000000e2b73797374656dcc63706367727d75701500000000000000"], 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={r2, @multicast2}, 0xc) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6d8}, 0x28) 10:26:36 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2d0}, 0x28) [ 1344.339057] Unknown ioctl 35123 [ 1344.356319] QAT: Invalid ioctl [ 1344.504225] QAT: Invalid ioctl 10:26:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0xa0002, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=@upd={0x128, 0x12, 0x40c, 0x70bd28, 0x25dfdbfc, {{'drbg_pr_hmac_sha384\x00'}, [], [], 0x0, 0x400}, [{0x8, 0x1, 0x8}, {0x8, 0x1, 0x100}, {0x8, 0x1, 0xdbe}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x6}, {0x8, 0x1, 0x9b3d}, {0x8, 0x1, 0x42}, {0x8}, {0x8, 0x1, 0x1}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000}, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x6e, "42ad7db08fdb1a6db90aea111ffefb374cea45b31dce21d650f19305994693ff3226d425dec0b5768315eb8d6f15857a0490559cf16cf3df3f85032f4291579b594ab974cf0629387b50b4fff5ce8cecf191ab0347a2387b031f6cb35ad4c1d5cd3d05b6a978140f6662b27aed8c"}, &(0x7f0000000080)=0x76) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000240)={r3, 0x1}, 0x8) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x217}, 0x28) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1dc}, 0x28) 10:26:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000400"], &(0x7f0000000080), 0x0) 10:26:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x294}, 0x28) 10:26:36 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x80080) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000001000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) kcmp(r2, r3, 0x0, r1, r1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000100)={0x4, 0x6, 0x5, 0x4, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}]}) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r4, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc7d}, 0x28) [ 1345.028565] Unknown ioctl 35123 10:26:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="676404", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.upper\x00', &(0x7f00000005c0)=""/252, 0xfc) socket$vsock_stream(0x28, 0x1, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x55e}, 0x28) 10:26:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8100, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000080)=0x9446) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc9f}, 0x28) 10:26:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x894) read$FUSE(r0, &(0x7f00000030c0), 0xffffffffffffff79) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x90) 10:26:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa0c}, 0x28) 10:26:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readahead(r0, 0x3, 0xa2) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000201"], &(0x7f0000000080), 0x0) 10:26:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73f08d88f87d929e49ba006375726974792e2f6465762f66759a1e6c736500"], &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 10:26:37 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) mlockall(0x1) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x82) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0x41) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9da}, 0x28) 10:26:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa7d}, 0x28) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa24}, 0x28) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe35}, 0x28) 10:26:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 10:26:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb1b}, 0x28) 10:26:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x4000101000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) fstat(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x8, &(0x7f0000000180)=[r1, r1, r1, r1, r1, r3, r1, r1]) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe79}, 0x28) 10:26:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000002"], &(0x7f0000000080), 0x0) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2c1}, 0x28) 10:26:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000005c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9a6}, 0x28) 10:26:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd36}, 0x28) 10:26:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x100) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00', &(0x7f00000002c0)=""/52, 0x3e3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt(r2, 0x1, 0x3, &(0x7f00000005c0)="15fc09f66f9a07df87573fba25b3582b383d616db3f43f8e568012122c34cad88be0f951ece242c4880d47d262691aaffda2d4909b5c87c0960a181df524ef8f9b3bda918a4c334ae210b56e8f792a1b295d5b59b341b3ee3ef3d0a0aeb2ecc6c0d1afbdac4f40acb0d0f5639f90134e5cc1e06a25ca3f197ebb645cc24eb983ed04dd3d9bf439f0d3fd20c3796106c8c3f436fc1ec981e7c022e844d154fb26e901c541430dc343d7222269efeb55b2548f511b9750f10afc773d8a9f9de5ce7e15b11c6773b5efa17024f81f1fb8126c73ec2c6d1c", 0xd6) read$FUSE(r1, &(0x7f00000006c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576652e0000000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe70}, 0x28) 10:26:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe18}, 0x28) 10:26:39 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000800000000000000000000"], 0x90) 10:26:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="070000000000001f"], &(0x7f0000000080), 0x0) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa98}, 0x28) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5e4}, 0x28) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa64}, 0x28) 10:26:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:26:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbe3}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x23f}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9d5}, 0x28) [ 1348.071313] audit: type=1400 audit(1540376800.057:123): avc: denied { map } for pid=31839 comm="syz-executor3" path="socket:[227504]" dev="sockfs" ino=227504 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x82a}, 0x28) 10:26:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f0000000340)=0x4) 10:26:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) getitimer(0x1, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x600, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x1f) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/autofs\x00', 0x2001, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x47) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000003c0)='./file0\x00', 0x5892, 0x1, &(0x7f0000000480)=[{&(0x7f00000006c0)="d4182ed739c1d97a90b6bfbeed145b3d7382bbc516c04b48248aee7c45dfc09ebcce8df9993fb106b2ead4602c055c3d8414e4e0ee9306637e91faa816216882a871cb31a720b4239e7032f0c026bd65bb8721ad4ed1a28d9deb560436fe4e1f855f7e6b16515a4e4780bc8086a5f916cf3384eee68719b0e7030a7b40bdbc535e13379563227dccf110cf445036cc709ac93fbaa291948a67460dce01d69ea6", 0xa0, 0x400}], 0x800, &(0x7f00000004c0)='/dev/autofs\x00') read$FUSE(r0, &(0x7f00000020c0), 0x1000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x3, 0x4}}, 0x369) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="740100736b65642e6664"], &(0x7f00000005c0)=""/151, 0x97) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '*(\x00'}, &(0x7f00000000c0)='security.', 0x9, 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xffffffffa0010000) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa45}, 0x28) 10:26:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa27}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5c7}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x430}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x31b}, 0x28) 10:26:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4b1}, 0x28) 10:26:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x968}, 0x28) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xef7}, 0x28) 10:26:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_create(r1, &(0x7f0000000080)=@access={'system_u:object_r:systemd_notify_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x932}, 0x4f) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) socket$inet6_sctp(0xa, 0x1, 0x84) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fallocate(r0, 0x41, 0x3f, 0x7) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xffffffffa0018000) 10:26:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x116}, 0x28) 10:26:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x6}}, 0x18) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000340)={0x0, 0xd9, &(0x7f00000006c0)="efbabcc79affb00fb23ecb4f526b6b223f95944200100bec69cc9f2eec30e6acc981233fb212b9e60ecf437ff7a12d1c421dc4f2d90770d6f722c46067a81b4ce0b106b1fb06a7c4edb1d29904e6db9c1c065d7e3fb8e504f86ca1d7b8135a48e8f28c8d101e08b51846bd1d84ae517981f096e4dcb05fe807b19ad9d41e42994a4c0fe485c482365c6b46bf4448d599809a5f7f4dcf3b03b628bdfeaf8c3c6ef28cabcc5119d28b3f17c1a34db1d414f1bbb1bef458c50dee9d8046c93c6b68a79af1bc2363b24c8235f3f7c90a8eaad6d95465e533eb4b93"}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f00000005c0)="279da7ff8589373051e582ce2b0a5b0d9001712252e907596393c16da750397c2135960440661edd6aa0b72dbeabc85d285d9b8afadd304f9c9c4cf0028571d55f2363fc3c11d6451fe1d2ee6d71e8d221346d391d47b2a700b09e566ed7405bc6b7daf06a79f7fca55d6fd10e0809da101c097e3166ee669592b1def1461e15b0c57d0fbabc639e6ef947a2d74b25f882bcafe721f5f8a5532f2d5d9baed946e107832f961b97128720b3b52f71d9df9308885393d65f16ebcf9af5b85e3eb78aaa38", 0xc3, 0x7}], 0x2050000, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x885}, 0x28) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x69b}, 0x28) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7ed}, 0x28) 10:26:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xed1}, 0x28) 10:26:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 10:26:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x711}, 0x28) 10:26:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x100000000000000) 10:26:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd9d}, 0x28) 10:26:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000240)=0xc) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='?allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 10:26:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1de}, 0x28) 10:26:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',a,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:42 executing program 3: setxattr$security_evm(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=@v1={0x2, "70a098bf01ac01168611b6"}, 0xc, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = geteuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x1, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_user={'subj_user'}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r1}}, {@euid_eq={'euid', 0x3d, r1}}, {@euid_lt={'euid<', r1}}]}}) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xc000000000000000, 0x200400) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)={{r3, r4/1000+10000}, {0x77359400}}, 0x100) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}}, 0xfffffffffffffeea) write$FUSE_DIRENT(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367cc13501a993a871a9f4129481842726f757015000000000000000000000000008c7c5649893cb75e04ff"], 0x90) 10:26:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x6b6b6b00) 10:26:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000040)=0x7ff, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x747}, 0x28) 10:26:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x9, 0xd, "612e1b18ccb391cffbdb8d678ce5dc13533fb555926c0a44f5bb764319b2488c0fd4fe312fea947bd576bdec2cfdbbb909c32163d69fea0dde2cb7f1cc8c27d1", "d1232a2001f42702113e2df02333e9c29ec13af7d2c6f108b4422b555b66fcf2", [0xc8f, 0x3]}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000480)={0x1, 0x5d47, 0xd20}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x70a}, 0x28) 10:26:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4bd}, 0x28) 10:26:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000340)={0x10001, 0x3, 'client0\x00', 0x0, "f91c136c5400f172", "16f4d70aefca378f14ee4993169dbcc844050ecedd0140b83bac6f717ed04f33", 0x9, 0x6}) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) uselib(&(0x7f0000000080)='./file0\x00') 10:26:44 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x800, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', 'fuse\x00'}, &(0x7f0000000180)=""/51, 0x33) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f8dc39b12dc69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000060c0), 0xd3ffe0f2) read$FUSE(r1, &(0x7f00000020c0), 0x1000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x5, &(0x7f0000000280)='./file0\x00', r2, &(0x7f0000000480)="100d16f87fc6337421") write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x924}, 0x28) 10:26:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="03000000", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000654fe7b877534e8e79b46d316e6f646576656d3100000000000000000000000000000000002d8d000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000"], 0x90) 10:26:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xfffffff6) 10:26:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0x50, &(0x7f0000000180)}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa4e}, 0x28) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1c0}, 0x28) 10:26:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000003c0)='./file1\x00', 0x48) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) ioctl$sock_bt_hci(r0, 0xc00448ff, &(0x7f0000000a40)="348259e4f1e61756d3704acd95fee59d5d7526c92c35647813b2257023271f32eab7a4c8964bf5f8765df911f7183e4eafe3512e2701a713a90673fca64e83f04f9fc6b3a2ee635d9140e64d6f25c3520c3cab460062937bec1bc5d4af8d8efff3de1edf58ad93485b7598ba03906d5e707459a8e90c9c470b9b711d8f4348084eefa51e44f6796f09cb164f1197bd6de5f1a81f326a789e10a8c5fc56ebdd2bce6f3940cfb83590fbc18467129beef52ce6f365cc5e4731e06fbc123577a5650279183a2a4d") read$FUSE(r1, &(0x7f00000040c0), 0xffffffe5) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000380)={0x1, 0x3, 0xfffffffffffffffc, 0x400040000000, '\x00', 0xfffffffffffffffd}) openat$null(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/null\x00', 0x800, 0x0) r4 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x20, &(0x7f0000000b80)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r5}}, {@context={'context', 0x3d, 'root'}}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@audit='audit'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf08}, 0x28) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x283}, 0x28) 10:26:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf10}, 0x28) [ 1352.871649] SELinux: duplicate or incompatible mount options 10:26:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x2040) write$FUSE_STATFS(r0, &(0x7f00000005c0)={0x60, 0x0, 0x3, {{0x10001, 0x3, 0x1, 0x1ff, 0x50, 0x7, 0x10001, 0x3ff}}}, 0x60) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/5, 0x5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) [ 1352.928405] SELinux: duplicate or incompatible mount options 10:26:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x8001a0) 10:26:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x33b}, 0x28) 10:26:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) recvmsg(0xffffffffffffff9c, &(0x7f00000002c0)={&(0x7f0000000180)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)=""/215, 0xd7}, {&(0x7f0000000640)=""/85, 0x55}], 0x2, &(0x7f0000000240)=""/31, 0x1f, 0x25}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000440)={@ipv4={[], [], @multicast2}, 0x2d, r2}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2402000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@getqdisc={0x2c, 0x26, 0x400, 0x70bd29, 0x25dfdbfc, {0x0, r2, {0xffff, 0xfff3}, {0xfffe, 0x9}, {0x5, 0xf}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x40) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) sendto$unix(r1, &(0x7f00000006c0)="626206dd3e92bedb35", 0x9, 0x1, 0x0, 0x0) 10:26:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c374387c9a259178b44e505c871ff7c98726f6f746d6f64653d30303030303030303030303030303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) socket$inet_udplite(0x2, 0x2, 0x88) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x23}, 0x28) 10:26:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2af}, 0x28) 10:26:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0xffffffff, 0x6130a4ca}}, 0x30) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc6}, 0x28) 10:26:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1c1}, 0x28) 10:26:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2ee, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa6e}, 0x28) 10:26:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='\x00', 0x1, 0x3) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c89cc12706d6f64653d30303030303030010030303030316edd0d008cd5d077d0433030303030343030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x40080) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x80000000, @mcast1, 0x6}, {0xa, 0x100000000, 0x100000001, @dev={0xfe, 0x80, [], 0x16}, 0xff}, 0x8001, [0x5, 0x1, 0xffffffffffff0000, 0x5, 0x9, 0x0, 0x0, 0x3]}, 0x5c) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x1000000) 10:26:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1b8}, 0x28) 10:26:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000240)=0xc) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4a}, 0x28) 10:26:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',alther,\x00\x00\x00\x00\x00\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10001, 0x200000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000340)={0x0, 0xffffffff, 0x10001, 0x5, 0x2, 0x6, 0x81, 0x8001, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x8}}, 0x3, 0x970, 0x3, 0x96, 0x5}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x20}, 0x3ff}}, 0x2b6882b5, 0xfff, 0x23, 0x1ff, 0x8}, &(0x7f0000000180)=0x98) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x84f}, 0x28) 10:26:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67721900705f69643d4cbd3b0db0fe1cb39d752215a90bb613bdb87695ef7d0118c67b1926056b1b230b1baef23883f1d6cb6e891ed5620b66b7cf339a128b798c754f51a7c1ade2a9390f429d61018faf08c4ad0876cd32565ba9029112835cbd161677f26127b27dc430287ab80000004dbcca988bfdcedf", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x3238) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) 10:26:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000080000001000000000000002c000000000000000000000035a60000000000000000007066896f00000000002b73797374656dcc637075733595bd61746367726f7570246367726f75701500000000000000000000000000f3d204ae2454de68d23be4bda9fba81254ea639503685f16999c9bd3837e2cce0a8bdc10bad281f98806b46780dffb71cffdf6f2cc5aee"], 0xfeed) 10:26:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb23}, 0x28) 10:26:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xf6ffffff) 10:26:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000280)={0x101ff, 0x0, &(0x7f0000ffb000/0x4000)=nil}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) write$selinux_validatetrans(r2, &(0x7f0000000080)={'system_u:object_r:inetd_var_run_t:s0', 0x20, 'system_u:object_r:syslog_conf_t:s0', 0x20, 0x7, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x74) 10:26:47 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcc1}, 0x28) 10:26:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbc3}, 0x28) 10:26:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x77, 0x4, 0x8, "7839a1542a44a4ea6699566487264506", "ab838ecfe6c0c376728a01bc8267113d1903041757d3277754f31a20d0fd8a5a10b887009e8eefd50e4688348104ef86db010d75e16300c576ceb37f5e31c363a1b98385aa61b1ef91501c03be04a234bfd90a141a30b99804043a18896244237131"}, 0x77, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) userfaultfd(0x800) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7d}, 0x28) 10:26:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x472}, 0x28) 10:26:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xa0018000) 10:26:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="7365637572697479042f6465762f6675736500"], &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) sched_getscheduler(r1) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00003d2495bcbee30000000000656d316e6f646576656d310000000000000000000000000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000000000"], 0x90) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000080)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, 'user_id'}}, 0x28) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) 10:26:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x915}, 0x28) 10:26:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 10:26:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2fe}, 0x28) 10:26:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9ed}, 0x28) 10:26:48 executing program 3: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x400) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb53}, 0x28) 10:26:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x60f) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) io_setup(0xffff, &(0x7f0000000040)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x435}, 0x28) 10:26:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xa0010000) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x296}, 0x28) 10:26:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) 10:26:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3ff, 0x400001) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000080)={0x1, 0x253}, 0x2) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x837}, 0x28) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa62}, 0x28) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x62b}, 0x28) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7b8}, 0x28) 10:26:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r0, 0xa7, 0x6, [0x1bf0, 0x3, 0x27b, 0x9, 0x6, 0x7]}, &(0x7f0000000280)=0x14) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303083f8303048643030303030303030302c757365725f69640a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x4e20, 0x0, @loopback, 0x4}}, 0x8001, 0xffff, 0xe7, "80e044398c5508ba5c2d6d159a1af3e534f4fe49bf41c105320daf646f8ea646f812fde3e5f26458af3c7e9f52049d3afd755a86ed00a566ec053778f1e0973640630fb881f60283dc65f56cb9d30155"}, 0xd8) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2cf}, 0x28) 10:26:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000030c0), 0xfffffffffffffc5e) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x6b6b6b) 10:26:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc7b}, 0x28) 10:26:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c00000000000000000000"], 0x48) 10:26:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0xffffffffffffffff, 0x7, {{0x9d, 0x7, 0x0, 0x7, 0x7, 0xff, 0x7f, 0x4c98}}}, 0x60) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6d6}, 0x28) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x643}, 0x28) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd0d}, 0x28) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xac7}, 0x28) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2b7}, 0x28) 10:26:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='security/fuse\x00\x00\x00\x00\x00\x00'], &(0x7f00000002c0)=""/52, 0x34) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400c00, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000015c0)=""/4096) read$FUSE(r1, &(0x7f00000040c0), 0x1000) r3 = socket$key(0xf, 0x3, 0x2) fstat(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) write$P9_RSTATu(r2, &(0x7f00000006c0)={0x65, 0x7d, 0x2, {{0x0, 0x49, 0x7, 0x4, {0x41, 0x0, 0x2}, 0x80000000, 0x3, 0x335, 0x3, 0x8, ':keyring', 0x7, 'user_id', 0x7, 'trusted'}, 0x7, 'user_id', r4, r5, r6}}, 0x65) read$FUSE(r1, &(0x7f00000060c0), 0xffffff51) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x28d}, 0x28) 10:26:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0xf6ffffff00000000) 10:26:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x66b}, 0x28) 10:26:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd"], 0x6c) 10:26:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000380)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x27, 0x220000) epoll_pwait(r2, &(0x7f0000000080)=[{}, {}], 0x2, 0x40, &(0x7f00000001c0)={0x20}, 0x8) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x1000}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000050c0)={r3, 0x1000, "e1b44701f0931195b09e04435728cbcdcf23fc93cbaf543d37d65ec2d156e568866beb60dcc1953d0658fc88610aa147d77d940249d8c109ba41bdf4185af1abbf9f754d2ca52aa95e711f78f82d8fcb91ab5da8ef66239191064d54cdfe7e470222d764e38cc89a906e4f91fc7bc7fe04916075f76e963bfdbd8c0b995464282e55ba86c462cd72cfcb7f104e7dba4c5b4262eb23d55bb548e5c19ed9478c8000c01a21002510b9c5cad00071a691eb4ec9854a3565821280a8226d20546e3b66a3a7e78963bf9eee7bcc11928196a2252fa43484540e23b756afb61c66e46bd6f73c50b16d5eed1fbc881aebe1ca4994120f0a433498e9591e969bf908b6ebbf8fec08471843bfa1f67018994e2ffd54861bb76af138598a82ad8b30552be255c38215b9d02b8f9a5eb98c3e2e4fdcf6cf5810dc12da1f41e47600544d940cff5e567697fc533eb86747473efb7f1d9e2216726f4353b0e826af203e5ae28fbc0a922cef21da9a3ac123af762fa108347aad032809a29852722a40048710a731054b8a2e3c7cd08225a390a197497d04fc1fdd97197e105524c63683a2f48885b0efd5efe76a015ff9439e5c45bd8d33e518aa42b59607ed5daf068356fdbb93d80a6b8d71dd039ff231f0481a167c5eee6016e2f78367c920607790fa1f2f09684026a4d607f07cf7195da700932182cb2a56d58f226eea9e34a6a521c814efe4d6a58f5fc274b2d738fd6450def42f4fb74ee6c552effbbceb4495892bbf7c049a0d45a943e8073824efac30e0a986530534d5a1838b74303b45bd4a9ecc2f422f5cac4aa91a5bc385c42d9af120aad333ec22c33acb89474a3dd8936c61d1e624070680d8034eec6906480928b2b3b99d5edb435e12719884f5065b9828741fdb89c4bd47a9f04efb8b4ba6cee825c5089562f04637123f19bbea9243081d79494b82c2c2dc82749cbe63136d8634e359df3b1278fb08ac4d119cda8cbfaf0b49fc360a4f27753deeab814a54014cf44d01d924addbc12cfdca44ad4344d118752578b06a52324931aff44b467b726b5464fbff8c50d63d95f2a4348193e19cec2b7be549e839bb9fa54c360d16de742e0b0a1171431cd4455952d38b4597d73740b1a664416ac7ce7ec62b2c50ef21381f6253ccfa3eb6ef4056909bb6a1c2a3b7a1338ea247fc4b2627879432de3e4c729045340239f15f7fcce485b0b097dc7b056583dbc2f960e48b0891c1e8ed9d8ff83fd96386fc78995c74ec7d7536ce572f07d3f8702b25c22356378ef7cc2fb79b9fdc888d664f4fd8e0b2cd477c3c9f92b62eff9f598658b769afe12b33ecb98fd672aa023194da1946a32a90c710480016adb3bd2c5cc3403de3c03a5c0e7106d8a3a29aa07df33392f18607977e7c3e55f42f0064bc9f628d2a4741f1f50c3ff6c1bf76f97fb451e9d3cc2c6140434b6501eb4919dbf13861c2b478fa462fe012ed3646e9c122fc4af1a0efe8dfbc7de71411354dc58d74684fea33f8ed1a38350d2e62cb3e5f78e55b35b92f47ddf56a4448f258139641e9b11d82cb197947c4a279417ca3f048f09c8316b5e3dcd153b9e6da72efc4cfaad8b40067e6c34158557e98ae3ef56db6c80dc583fae2383b27e19babec24c93c1d72d17b6aa3f8b3934829ac71e20dc12266d12629db0145ba384c132b7de9ca005da17b685e63cc82b846e9965fec23cb81c8503bf23a68dac1976c38dce341f856e32e26ec8c5e281f4b4221621fd86557e015e6d32f4d8294f0952bc99a017b174c0f2de16c858d076f1a20a631a59647c08a3c78ce02d3433312b8e3c8be6f08af85417c56c4610a98972a77ccc52171bfc2f67c3a303963733495436c504b3d953deab9e02ac3d53d3318093bb7ac2102a81e65cba3873f77937a33aabe61cda00d9343dc82ba1a86884bb8cbc27d93ba6ff6945e90addc34e021f02655067bf845c0eded4296d6bb20cb41975bf0708c38a79869a599bf45662c04219907b72ffda25c36043666978aeb42b565f3be3574320bd78656da4574d2986aa2f401a51e99ba213548f429ab92f7616f7bb0f47ef66ec4e6a844b2a6ce22687de4b36e65df333113cb61bd10059450cfbf6d8cb18555f36057984a710544b857675d230fcd82720cd60ffb40e504a94ccfc29388afbf979b842c60f573d810e187c27bac44cc4f41add675c7ecd1296be8ffcfbfce419204771f36f45b6bb5af855bcece34fd55ded2d303f128c8d65ed752d513b9280ed559c43afad27a9765ffee12f8b55e5c8c62fe38f748cc1c7d8a8d2fe151dfa9de6e0434627a83198d77f68d009ed7a74bc6f3c6f6021d3a18f6f663d7023ed50153cc2480ae40a9e64523697953e0cd76d4fb8b84c5a5ea7dcfc1e777db98c67a4d28beab212d2c6683758a4eee7ad07aff9756e8641b8807260bb689fa6a0dda1b2266196f61a23a247c17db4137c6196540f3f09c3bd9308baa366848176e59f5670ca934cfd16e4290e9f6547e0986a88045bc541306dbbe39834debcec72d44222226bdcfcfa9aa713dfce6138c1a53cb15f7555ffbdb634f12b69f7e342a024542ada4d01221c1cc2df5ac5ba0ba23c36257577b441a066671b4a2644ad872c3692fbac2ca5176236203f426ae9bdcc8df5ba104202dadbf794f70846030d09610f1da108a8b863a13705da7a40ae8069c5fd946483aff37b8847dd808e1af3a285b3a6f6e85568b334d90e26899d791003c89e9f8560747cc87df1e8355b64c8f06b76f634c4a70cf7abab81a8194d4b00a64edf0a9fa3de480e34c0a7e56347878d88b708f821e517776e7ada3b1d643325b06bd92aab0b5bf73abdd5fd9aba61ff5bed5e1e8baa8d8c57e1ca5c08df2f7ebe935c42d78041c022c046061eef41754beb5fbdc63571d070c040f216eceb41e1e3e4a599fef336aabf9345f0571e419bedce08ed1b5f1ead192ff8bc0554842f4a0d18f4d7db34b9fbbf8536e34679c10d2ac772a753f36157021e76e044f34630f991309ac11c38cc132c83dbe5233b2e6a7f0296cbd1bc0c50e06455dfdc2037c738a55fae2b2f0ac1b2a1efbf7cb8ff6ce96cd06ed81d3b6dab5b22b502410ce46d82c9fec769fb8c15d118cd3b7214ff745194082e53cabe653ef43d7d2d3edeeda7951205a63968886c9362a8d7d7b689f873e83578b98d1711c2b7a9612a36785e5f653b54ce90170d556f17305ed02b6132908a04022b15b642f6bc4df3ba5a2cf3283708cf969ce7f3914251850b83ab7c6f396d3a604f8b8d65933ddc6dc0692ec528815e7203287883e16c05963c6707a316b31c45f7452f50e1ff3ef688bc53afe09592a8766976a8a181363e2617844d23155266478982a897aa3eb90e5fb78610dfe42b5430a95c11e030cb90a510693244fa714fdde3414b12f8d49f602e00b3b4feac85349f302ced4253d40b84ba63d53abcfdf8c7653730fa9fd340881a851ccab299e1ee2e512ee61446a3a2f9312243b958a3c6d2ed8d74efcb7be68b106466c7b7c63e01ee75d5e7329edeaafc8fe6e7f8f22281071d6b87a9f580bbc5b5f6c470b997865e90598f9f2b83387361de5c0937011e0da6b5cf54a829b09272395d8feea6ae7db282b8515714aec3b8b0e8e3d7e899d0115c14af61f37aa3fa051fd397030aee4a46d48fb5709633935b898f675bae344d35203137c2feddc48919d0a1b72ebccf5d4d723339d007d25feea14598f56734dd8905a669446fe36b587526db07f47309ec7f43d187f6d120e632412bfb3e05d4d6559fa85703e1e84061a6fc24ed28e101c1bacf4cadccd4e7589a89136f66ea5b48bbd6b9746f94bfe3d14f3126345bc2027aa47b8bec2ed9397a26e16492288754d164cf220d45703d3498ea0e0be7e3e26237b8471cc5472c1da61a22264d1e9c923d09c9f741a999e8b1af39f67a54f47a6458d8f123a22fa36ea9c75b74b702691a5aa26eedf42d22043c9012a62a10e8a048045d20ae8c842c13cbac81706ff6692a450d214945774a9161b7c7d61d235a28f36d871c21a64eac7c1870bf32ef1aabeb02337296d4d672de832d609173d84d02dfefaec013a8736ca089a77a755b60e8d768fcc694d6db46ec406134721592b19a53bad3f28c6e35d0e0da55ae08fa094543240ebad50d67339c014d6d32bf0a2027df858107ee241c1f69be155aafd240754b50df333aa4a5a51072dd08f9dec6c5dc497689d6eb64fd5a21c9f0b55b70078319d2d648d1955dc92c753a97042c7e955e1075d40d06d087541072fb6d35c95a7bcb5dc2f7747a111a115ca0eef4a44f92514de8d034864da58c94e96593b3cd941dc1cfd8ad7fbb5ab5525b8cf6284697f3f4e1ba050271a5f773b0bc6b14e874ca960a999193c40f4ea165ba2bf51a4b680841aedd3f71db9ddf1feefa2207d5c92c9d4cc5981feac6279e1db95e3cb997f2e42994527218cb246acf4c3d7f9d76b21625ff68eafe8f142f2999b04cd4bf2ea6eca2f0efd327fcc99cc6ba2741d70d7ab87cb5608fd6344c9d64dec29b6a69095aac63dd49006c10739339f8814cafb4bd7159819ce7f55272322f2690e9c49a6f822eaac6dc2168ed3a2f4b03147e7e59f5416c9df351f7968c5649c435de045eb66bb358d4cc4e78fc6ce03c5a35630cee08a232135d10c8422d11e504eebd39d1dfb2dce0dac10073b49820e192742d2c0698c84a0810c5847ced37caff2651f124d49ccf748468c266557b20ee02eda1e8f4d3ddbfbadd71a241062ad4c820e6a030664c486b6d0bd59ef2fd073238292233ec3fe6b81102ac51ab3462f3f8c18caa790520ca0cfbad8b6ebdd48306cfbe636ab91338c7ffeaba03b99a8dc2b77fd8d167b9593c4ae2f5b41f40905eb4791e032d50e02713e2dbdd90837993393bf85faa821f4ec0e765a771ed479c780cf541115d6ef063420a1c29b01c653728d406e858ee29eb3ef5bb67c51b76bfe3631cec7ed30340e5033d9f82b45f3acf970aa6fd6b4cd9a064f4a9433547eac7b9109b83d66ea0dbf2613448597f1c57c6c79cc33f613d8d8df1183f8352def2429fd5eaa997c65ffe0eaab88dd91a862862c90f6390dd1786c01e13c0bbafba5149d75688b0e757c475f104eb09ce394d1546d91cf096dc2e0c53eddc3caaf7ba41b2ed2760114b67e040e5e776ce66c7c071295c5bc4c0406f7d043ba1688cd75fdb60adb02542458f639f8e981931545aee79cf93dce85f8499c4341f668b7f1772dd738521552e6dbc50ff7d9e2654abe24d3fea591bb8a50a2dd04f2b5916ce77389fd8ad0da10daa5606dbeeea15b0758c1cab2dd2df70de4fe61bde1227631b177287ea2803b4ea1ea1be779fc68b09a60b99cd6836da4b0a4b3104ab5f7d4ef38ad02bac3bdf6db29dd1abb800b98cac0769a8a96d3f10f8f5dad8adf4beccff457190641e77c5b2af058189b92eb14ed7e3c70153128d2912832a87241bb4b095efe716ebcc9e126277276313360615df751dc7941ebb5401d912607b607267916f1db8b122eb1127ae1c5dd4ab2c73edab24a96c5982c503037d573f11c891fee0c8a2080b5e93563cd63d2996c46fc970268acd766d668d30710e15320aa94741462dee7a5951f51acf96e1bb5fee3a7f5ac0581b74fe99189fd21294929a5e3286aac6fd17fe16a1cbd5c22bef31358b86386c5ee22d5cc68a5254ded3ae441c95e7d6890b5c129d8ba6f39f1c7443bd6aefec12f58a6d663785a2e3dbf9dd2f7c9945d76dc49d747d0cfb09ff6"}, &(0x7f00000002c0)=0x1008) pread64(r2, &(0x7f0000000640)=""/4096, 0x1000, 0x13) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file0\x00', 0x10242, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="901f0000000000000200000000000000000000000000000b00000000000000656d316e6f64a0eb656d3100f73aa13e9e91f7fa00000047000000000001000000000000002c000000000000000000000035a6000000000000000000002b73797374656dcc637075733595bd6574636772316367726f757015000000000000000000000000000000000000000000000000"], 0x90) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x641}, 0x28) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x8b0}, 0x28) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf09}, 0x28) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5fe}, 0x28) 10:26:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000040)='fd', 0x1) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcd3}, 0x28) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd29}, 0x28) 10:26:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x2000000) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x8e2}, 0x28) 10:26:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="9000000000000000000000000000df090000000000004700656d316e6f646576656d3100000000000000000000000000040000000000000000000000082c00000000d200000000000035a6000000000000000000000c000000000000002bb895247f29737aa3c1e72cfec7797374656dcc6370757327db3bf5808a31236f7570246367726f757015000000000000000000000000000000"], 0x90) 10:26:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000000000000000000"], 0x90) 10:26:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000040)='./file0/file1\x00', 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000"], 0x7e) 10:26:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x83}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc63}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb0e}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9af}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x32e}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x232}, 0x28) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5d}, 0x28) 10:26:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000080)) 10:26:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x200000000000000) 10:26:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 10:26:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000"], 0x87) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x108}, 0x28) 10:26:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x861}, 0x28) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x76f}, 0x28) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xeb4}, 0x28) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x874}, 0x28) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x13c}, 0x28) 10:26:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x92a) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000005c0)={0x9, 0x108, 0xfa00, {r2, 0x9f, "1fe8d6", "7f44bc5e8c1e50348b16d70c97f05d9a76ed8046380d0f9cf0666d0e2f542e93bc27f460bbda3c7987eed0c8c101c9fda4715e412302a9b0d7a07f9ec1c76581e7a0771df63d1ff1bc72c2bdac1528f54909ff5e30b806a6ecc4abab7f27a7409d81a8a8be99f1814600188dcde209e914da257defa3f0793161f8d8e94bf120aadd6ea2ea6bf5665c7651727be64c1feedd3d5074e43c3f464909da08584f1afda17b3f3d238f4534ed1d0733bf4136505c160b9e84503cc5d71e5b4160d879591ec3fd7523bb16b61382173a57b90bf8506e69658ee678a546171add600db36f39ecf176bc3ec4eb62bef8b530302a645b0647cf8f7f1000dd7915634c737a"}}, 0x110) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r3 = fcntl$getown(r1, 0x9) get_robust_list(r3, &(0x7f0000000280)=&(0x7f0000000180), &(0x7f0000000340)=0x18) 10:26:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x6b6b6b00000000) 10:26:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb8b}, 0x28) 10:26:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000000000"], 0x8c) 10:26:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x387, 0xc815, 0x100, 0x3, 0x4, 0x3, 0x3, 0x5d7, 0x85, 0x38, 0x1bc, 0xaba2, 0x7, 0x20, 0x2, 0x1, 0x3, 0x6}, [{0x1, 0xc0, 0x7, 0x7fff, 0x5, 0xd8a, 0x1, 0x7508}], "aea1fa49642901ba6262fc9d4f13177f08249504797819e5a343b4dad813354f48eeb2c536e90bb8fbac19095a79efe32544b880a234d654035aed2e73866ec554a98ea90d5532a5000e829a3d1faaef0201a221ff8b39462ebe3f17583dd9728271e005ade43266b2b8f0b2bdbcb38a3c6d99d500da4734a5e995042066ce47cf7d098c67df0ed2d0c8479216cc0743277a301f639208c1998eab7e83465b524d98cd5ea34216d31446329b130f63a0ffe6820c6cba82236b6927e468c2e8fed2efbc3aa5fba1d0649697827b60c39cbed70c7c2d449b5a54e7b92d23", [[], [], []]}, 0x435) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x380}, 0x28) 10:26:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030300100303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000240)='./file0/file0\x00', 0x40100000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000340)="01279e894a8875e4bbac2a098f15c75578f679293bdfef61302c70a33f153af8f3ea325ad8c9cf16addcbb7cffe70b57607eebd3358933220f4f56c605d4f7b7928fabe766c8ff97512895da863f4f80b9c9c3195211bd4364b354e40054e03c8cd83cb62328f36ef59589efe03b3713df004617ebe3396ca4d7b1393d6d5392c4f2b0fbff48a230368a44b0994ee9fa0febf7fa05bb92e1f810fa499fcd0828cf8a23ed0ce93e0292bcc2b7937adb506054f9a005ac1462d19be5f49c15cefbbcc2587f4f7792369430b036f9c0173e580699daf095db9d2b54e2545302483b8a4bdc17eb8b71c19e", 0xe9, 0x5}, {&(0x7f0000000640)="6690a6d8d16ccc23e786c19bc128d3192bbd52e85c3bc86b796de8715539fd3bafde7250518862282e5171c335df46ff2bebe896b25bcdfbec51ad268d7478075bc5839fa0d460d27e59b4225367ba136741d20c7dcafe4885ed37fc5c2425a4b000ab61e6496f", 0x67, 0x8a9}], 0x22, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'maccroatian'}}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@hide='hide'}, {@check_relaxed='check=relaxed'}, {@block={'block', 0x3d, 0x800}}, {@dmode={'dmode'}}], [{@pcr={'pcr', 0x3d, 0x1b}}]}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000780)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x8, 0x5, [0xc2, 0x7, 0x9, 0x1f, 0xfffffffffffffffc]}, 0x12) 10:26:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcf6}, 0x28) 10:26:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x2040, 0x0) pwrite64(r0, &(0x7f00000005c0)="78f46232c7a416b1c0994791a56f6ad72ddedc9df8234921c49f97234750fc41415751b0f7e46ad2e04a6a3ccbab0cf8d00b8f1dc967fa75598a4bbc190b2007a88dba5097f8ab2a84505bf65e1fd3ad425df66340828d966e432a4b354ae95489a05ca32951262aee86027df154c0e3e5da3f9523f7c374e6352884de58e55fc8ac552e0d4c0e9e95565f0862a2ce1b248df7aaa3100cd7636884c7bb48e6ea946f7f304fc4ef6be5c31cc22c1815757325eb70ad0d2abff2791b28ef6206397818570f08034c35c39bd3de548aa35b9055532579a44f2d93096ae38561b37a2614dfe31d32606212f901b80ff1c26ad7", 0xf1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='security.', 0x1) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000080)={0x5, 0x5}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000540)={0x10001, 0x5, 0x1, 0x0, &(0x7f0000000700)=[{}, {}, {}, {}, {}]}) syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x100, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000020c0), 0x1000) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x10000, 0x0) write$P9_RREMOVE(r5, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000480)={0x6, {0x2, 0x4e20}, {0x2, 0x4e22}, {0x2, 0x4e24, @multicast2}, 0x80, 0x2, 0x3f, 0x7fffffff, 0x1, &(0x7f0000000380)='teql0\x00', 0x5, 0xffffffff00000000}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r4, &(0x7f0000000500)=ANY=[@ANYRESDEC=r2], 0x14) 10:26:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0xb0, 0x3, 0x4}, 0x401}}, 0x18) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9c}, 0x28) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x480}, 0x28) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x808}, 0x28) 10:26:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c00000000000000000000"], 0x48) 10:26:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x1a0ffffffff) 10:26:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000000000000000000000"], 0x8e) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x385}, 0x28) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdd2}, 0x28) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd14}, 0x28) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9bf}, 0x28) 10:26:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x180, 0x8}]}, 0xc, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) getgroups(0x1, &(0x7f00000006c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000009c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}, {0x2, 0x4, r2}, {0x2, 0x3, r3}], {0x4, 0x4}, [{0x8, 0x2, r4}, {0x8, 0x7, r5}, {0x8, 0x5, r6}, {0x8, 0x0, r7}, {0x8, 0x0, r8}], {0x10, 0x4}, {0x20, 0x4}}, 0x64, 0x3) 10:26:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x88a}, 0x28) 10:26:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xa44) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000001c0)='trusted\x00', &(0x7f0000000240)='/proc/self/net/pfkey\x00') open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc4d}, 0x28) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xea}, 0x28) 10:26:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd"], 0x6c) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbb3}, 0x28) 10:26:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x8f) 10:26:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x1a0) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7f7}, 0x28) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4dd}, 0x28) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x809}, 0x28) 10:26:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xca5}, 0x28) 10:26:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x2, 0x0) name_to_handle_at(r1, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)={0x7a, 0x40, "0f188265d77ad335937471df6d522e659cd8da6c71b0497794bff768df1ec8915d7fb60e26cc4f89f5e95c2d2ba16e5f3962f2c549cff7032eed325925131fb4623b9ddab1e62c43d3c37a4d2e888ef85a5e1d0d681fa4d882bd85f2335122e84616e6b629bcf81b926bc2dbd4a1740fd3b3"}, &(0x7f00000001c0), 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xb4, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000002000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000240)=0x8) 10:26:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe01}, 0x28) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x62a}, 0x28) 10:26:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000"], 0x7e) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf15}, 0x28) 10:26:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x101080, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000780)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x8, 0x2000) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000340)=@llc={0x1a, 0x0, 0x6, 0x9, 0x800, 0x6, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000005c0)="45c7d6b65a26ce0edec32e880a4d25c4dcdc277ae414b1f3e7c3d4f8ca02886c5bed3cb27735de29c5694a604c1c322d580be31e7bc92503bff1e8f469559b1f02450157cd0b0a2e9217f316b23e77b2f3411ae0342a8ca9f8d518cd3276f2b5dbcdebfb47de00c5fbe87ab2c1fa09e37690a368516f6388450893cfe41e37f0b8d32bb25d52133d988895657053d06dadd725183a750d7c8985e6ff99024840c264ea459213ee9d16b98510cdfd39179f0841a4c15004ceccbba7b7b545e2e7c0071c474f96be5adbe00d148ff4bc03282ef044", 0xd4}], 0x1, &(0x7f00000006c0)=[{0xb0, 0x107, 0x1, "15420ffcd18befb1f7e6ad01eb9b9407bae7b9433db9aa316bc1f2649c9539ac1e7eec9786c55634a385963e4c2b8394828021d6a424b10b05a4beba115f24b72df49101fe80716dbd6fc9078f0b61d17de3238bc224298bf5249de8aca7e9604b39e7232c56bb2e7327895ea32276d5fe0efb1719058666d85365f9548c86e45a3cd76aa2bd2b8c612e720240285eba061d9613aeb1b2eff433"}], 0xb0, 0x80}, 0x80) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000480), 0x4) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffffffffffff, 0x40200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x800, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f00000000c0)={r4, 0xef}) 10:26:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x2) 10:26:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000040)='./file0/file1\x00', 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xecd}, 0x28) 10:26:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x8001a0) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x47a}, 0x28) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6a3}, 0x28) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd3a}, 0x28) 10:26:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x30, 0x80) setsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f0000000740)="c5215579419e8aa9388f5953ee5311fa6e1094b84775dece2be068f07a3f39c857926d4ae3f0d50347615885fd86a25560aec31f3e3b32b422a1b413c9b1075ad53620631a576cd8564d983f97155786d32211e5335bc0594d8dc1ee5db74ff615d5dbc98b77bf21372b1148ae28e9", 0x6f) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x102, 0x2, 0x80000000, "4517af792419e2dab19457a88b917676", "f5268917790c98898d414e0fd03f8afd866d1adeaf5cda0a17797f3e8d4eb6af5de8e66a033eb07ad26edb78aab088506ff6bcae26e52c7b4c6b769e76f51a3726bbc2a3769632e9cc6821ab06ff4194c7f313c926c5acf3972e0232d4cf8762e14c073ae7977df1bd053e9fdb7e4c845c7c13319519a9f1f034b78db689bb2d4676c04541d6b4a535766acce3a8244dcc883db04bc2193174aaf2b0564cbbce7720881e456a3c8b6629675901dbdbb81e2a4ac13a4384313fb80845c7653b5f95026026d45083031f1a233000956c83327eeb7da98de15ab54f87b4daa1224af739d71026305a6751f1bd8a45"}, 0x102, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r3 = fcntl$getown(r0, 0x9) getpriority(0x3, r3) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000640)=""/195, 0x5}) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe34}, 0x28) 10:26:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2dc}, 0x28) 10:26:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000"], 0x87) 10:26:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x236}, 0x28) 10:26:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x8001a0ffffffff) 10:26:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:26:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x75b}, 0x28) 10:26:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x121080, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000240)="339373bab265c88b8f777cc3df3b09f0", 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:26:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4ed}, 0x28) 10:26:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000080)={0x4c, 0x3, 0x3, "41384dc788716e34f400535ec20c4587fa6766bccbdfe8bb93310026120a28219a1ad4c29a7b71f9d45c5c17f9ab0b12537d71f717699e591ba20826c4f36e824b7a2e4f4dab879e1c62f937"}) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000039010001000000f5988c6c09a778dd000000000000000035a600000000000000003d000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000000032f9bf6172b4b7c261722a34ea4c5ef6f47be39a0cc07746dcc79a4a7959280a716094"], 0x90) 10:26:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:57 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:26:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000000000"], 0x8c) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcbd}, 0x28) 10:26:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:26:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe7e}, 0x28) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x79a}, 0x28) 10:26:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd11}, 0x28) 10:26:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) r2 = dup3(r1, r1, 0x80000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000001c0)={'nr0\x00', 0xfff}) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:26:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x40, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='nr0\x00') read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x640}, 0x28) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x65e}, 0x28) 10:26:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000000000000000000000"], 0x8e) 10:26:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb12}, 0x28) 10:26:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb0c}, 0x28) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x60f}, 0x28) 10:26:59 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7d5}, 0x28) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x961}, 0x28) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x850}, 0x28) 10:26:59 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000100"], &(0x7f0000000080), 0x0) 10:26:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000050c0), 0x1137) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1215) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000000000000000"], 0x8f) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2df}, 0x28) 10:26:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x25e}, 0x28) 10:26:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4e7}, 0x28) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x990}, 0x28) 10:27:00 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc6c}, 0x28) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7a4}, 0x28) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x88d}, 0x28) 10:27:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',]']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) ioctl$KVM_NMI(r0, 0xae9a) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xa8000, 0x98) mq_timedsend(r1, &(0x7f0000000340)="22b0f2b35a926f56444789ec9ac0b4cb18c4d98476139772c84e56e26228af07bb925a574f7360b9a184e765cf377e70d6577147a39004d42869019b5f24509fa1969383d285ceec98287f9cb7de686c159afe2384372d1f0e45871385500f1bab6f2d", 0x63, 0x5, &(0x7f0000000240)={0x0, 0x1c9c380}) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',aSlow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x2}}, 0xffffffffffffff84) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='f\t\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) socket$inet_sctp(0x2, 0x0, 0x84) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x805}, 0x28) 10:27:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0xfffffffffffffeb6) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f6465760e9c183009b15eb7e5a97c3304d3c92e656d310000000000000000000000000000000000000100000000000000e0000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075730700000074246367726f"], 0x90) 10:27:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = getgid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:00 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9b2}, 0x28) 10:27:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x9) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000080)={0x9, 0xd85, 0x895}) 10:27:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x10000) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000080)={0x2, 0xffffffffffffff9c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdd3}, 0x28) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x38d}, 0x28) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd69}, 0x28) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x258}, 0x28) 10:27:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) write$FUSE_LSEEK(r0, &(0x7f00000001c0)={0x18, 0x0, 0x1, {0x9}}, 0x18) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x8a8}, 0x28) 10:27:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:01 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xafe}, 0x28) 10:27:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00', {0x7, 0x100000000, 0xfff, 0x2f}, 0x1e, [0x5, 0x10001, 0x131, 0x1, 0x5016, 0x7fffffff, 0x5, 0x20a, 0xfffffffffffff001, 0x7f, 0x100, 0x3, 0x16b7, 0xfffffffffffffbff, 0x100, 0x800, 0x5, 0x2, 0x4, 0x20, 0x2, 0x400, 0x10001, 0x781, 0x4, 0x21f6, 0x5, 0x5, 0x5, 0x1, 0x400, 0x97, 0x361, 0x7fff, 0x4, 0x7, 0x0, 0x7f, 0x9, 0x10000, 0x101, 0x528, 0x7d, 0x3, 0x504b51d9, 0x5, 0x0, 0x6, 0x9, 0x5, 0x9, 0x6, 0x8, 0x7, 0x496f, 0x100000000, 0x7, 0x10001, 0x9, 0x19, 0x10001, 0x100, 0x80, 0x7], [0x1, 0x1f, 0x3f, 0x10000, 0x9, 0x10000, 0x1cc, 0x4c, 0x5, 0x0, 0x10000, 0x80000001, 0x4, 0x7f, 0x0, 0x0, 0x800, 0x8, 0xc66, 0x7, 0x0, 0xfff, 0x6, 0x0, 0x3, 0x6, 0x80000000, 0x3, 0xe2, 0x3b38, 0x3, 0xfff, 0x7ff, 0x3, 0x8, 0x8000, 0x0, 0x7, 0xffff, 0x8, 0x7, 0xe7d, 0x8001, 0x1, 0xcf, 0x7, 0x3ff, 0x4, 0x2, 0x7fff, 0x3, 0x7, 0x3, 0x80000000, 0x3, 0x100, 0x8000, 0x9b9, 0x0, 0x5, 0xe1d, 0x0, 0x1, 0x8], [0x1d, 0x9, 0xf923, 0x9, 0x2, 0x10000, 0x800, 0x6, 0x4, 0x20, 0x3, 0x0, 0x9, 0x3, 0xa839, 0x1000, 0x800, 0xfff, 0x2, 0x0, 0x2, 0x7fff, 0x2, 0x7fff, 0x80000000, 0x55, 0x6, 0x0, 0x2, 0x200, 0x3f, 0x101, 0x0, 0x7ff, 0x8, 0x7, 0x30, 0x5, 0x4, 0x1, 0x1, 0x10000, 0x1000, 0x1, 0x0, 0x7f, 0x746, 0x0, 0xffff, 0x7fffffff, 0x8, 0x80000001, 0x8000, 0x4, 0x40, 0x7, 0x1, 0xd02, 0x1ff, 0x442, 0x8, 0x3, 0xa1, 0x5], [0x4, 0x3, 0x80, 0x5, 0x100, 0x99c0, 0x7, 0x6, 0x5, 0x2fe1, 0x40, 0x3, 0x0, 0x5, 0x5, 0xfffffffffffffceb, 0x3, 0x2, 0x1, 0x3ff, 0x8, 0x2, 0x400, 0xa52, 0x2, 0xfff, 0x2607, 0x1, 0x80000001, 0x2, 0x4, 0x6, 0x400, 0x9, 0x8, 0x0, 0x800, 0x1, 0x0, 0x3, 0x0, 0x7ff, 0x100, 0x9, 0x9, 0x6, 0xfff, 0x0, 0x1, 0xfffffffffffffffe, 0xbaa3, 0x4, 0x401, 0xffffffff, 0x5, 0x7b8b, 0xa072, 0x20, 0x7, 0x4, 0x4, 0x3, 0x91, 0x80000000]}, 0x45c) 10:27:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf04}, 0x28) 10:27:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb84}, 0x28) 10:27:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x40) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xc) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$P9_RLINK(r0, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYRES64=r0], &(0x7f0000000080), 0x400) 10:27:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2f}, 0x28) 10:27:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa5c}, 0x28) 10:27:02 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000000c0)=0x9) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x12, r1, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1ce}, 0x28) 10:27:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) 10:27:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x1) 10:27:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3da}, 0x28) 10:27:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x430d40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x430d40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0xfffffffffffffffd}}, 0x50) r1 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xfffffffffffffff9, 0x400000) openat$cgroup_type(r1, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$getenv(0x4201, r2, 0x3ff, &(0x7f0000000240)) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a60000000000000000000e0c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f7570150000000000000000000000000001a6d507186434a16f39e986c905938e9e034fdd4bfacbd936fc8c88d49302e5aca54b751e2596f498e2441a3762f293e4f17926268886b0030fd3ea563fcee623c1890561a5ccf48af5d9897382e62bf65f2bfec0074c5faae308c0f446982c895e97d8c2549652a84d331d7712f5433524bd9a0066b805cc21014eef9ddea20fc44897ed70ecd00bb6bff03a4ae4a9eef5878edcceedc6a22ee99e7c1bbc2dda205234b38ba40566659056e3"], 0x137) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="070000000000cd81"], &(0x7f0000000080), 0x0) 10:27:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5fa}, 0x28) 10:27:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd7a}, 0x28) 10:27:03 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f00000000c0)=0x9) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) mount$fuse(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030ecd1153a30302c757765725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,fowner=', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r1, @ANYBLOB=',audit,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5c1}, 0x28) 10:27:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c00b726e08ffc27e205d5103e7d670a6db0eb4346c1fb232d3cb567c00bf882732446a14eba4bdeff1957e84893da1c68edca24a77a94e383474b46704a9746d5c34612991c12994542e9c92c523c852bca1fae86029a32d7020c5e5fc85819192f211753728a744996af086288bddbc821541450024bedc76025ab6662bbaf1a636959ecfb63ffa886daaf84a86ce738bf2fd7c3a94678db9fee4c"]) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40080, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x406000, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x323}, 0x28) 10:27:04 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x8000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000340)="58e6dea1e317e86bf718fe0181efa84da82f77b848d74ea5bb1e9057b546fae39d75799f6b9d099af14e3daab0842a488436371e8db056609eb18a487e0f915914b8f85b875942b6aaa94b20bc5346fe4016224bfc57a8bdb4c0641f2d42a9a227d0cb09d62ec560243df100a117dbaa49b7627f6fa4d899f00c9c1620e671495aacabbfea2fc9f7dfdc0e047bdcf9d087fcc5106bfae16e1ec4bb363cf2b9f6980a5378721784e028f1", 0xaa, 0xfffffffffffffff8}], 0x10, &(0x7f0000000640)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@uid_eq={'uid', 0x3d, r0}}, {@appraise_type='appraise_type=imasig'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/fuse\x00'}}, {@obj_type={'obj_type', 0x3d, '.vmnet0'}}, {@smackfstransmute={'smackfstransmute'}}, {@uid_gt={'uid>', r1}}, {@subj_user={'subj_user', 0x3d, ':&+md5sumwlan1/)proc@)selinux'}}, {@dont_measure='dont_measure'}]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x210702, 0x0) getpeername(r2, &(0x7f0000000740)=@hci, &(0x7f00000007c0)=0x80) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000b80)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fsname={'fsname', 0x3d, 'dont_measure'}}, {@dont_appraise='dont_appraise'}, {@subj_user={'subj_user', 0x3d, 'mft_zone_multiplier'}}, {@uid_eq={'uid', 0x3d, r1}}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@uid_eq={'uid', 0x3d, r0}}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r3, &(0x7f00000040c0), 0x1000) read$FUSE(r3, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x400) open(&(0x7f0000000840)='./file0/file0\x00', 0xfffffffffffffffd, 0x3) write$FUSE_DIRENT(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030322c626c6b73697a653d3078303030303030303030303030313630302c64656661756c745f7065726d697373696f6e7300080000000000003d3078303030303030303030303030313030302c626c6b73697a653d3078303030303030303030303030303230302c64656661756c745f7065726d697373696f6efb73f91d6b73697a653d3078303030303030303030303030313030302c626c6b73697a653d3078303030303030303030303030303430302c0049052b"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x581100, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000240)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000340)) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d31000000000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd6f7570246367726f757015000a00000000000000000000000000000000"], 0x8a) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1f8}, 0x28) 10:27:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x884, &(0x7f0000000900)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="8418abac74658bd127fdc747e00b9d5a735b532d3f78d002c63626d5b4b5c424547411a1b8c60423805ee009d432411f743ba125fa5542fbe2c6d0a0f0e22d3a4f958bec3abc2d6c2092052d055f2f9af64ef6684a5ac1d6b9cb599273c6be362e8d3338b83b42e9a97ddefb3094d730e724f6e8c2ebac3434019b207999c55a68e7f23adf08cd1942b1648cc694add5dcafb8762eb04fd021b29a3e903808badced2a66e999b93aca91737698c682f8688565c99d6815d26057a7cb19f232b4ff05826d709d3db9dba025c943c351aacc086104195f2c8e", @ANYRES32=r0, @ANYBLOB="93bf6ce499f14026045fc014d0f751aa2758e30d7845f849b8bf4cf0e9b78c5b3591098a19b7a6269205345e3d0ec800", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRES32], @ANYRESDEC=r0], @ANYBLOB=',group_id=', @ANYRES16=r0, @ANYBLOB="2c61a3e0909300000000bf3e17c66f775f6f746865722c00"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x200000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x84, 0x2, 0x48, 0x9, 0x1, 0x7fffffff0}}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x62, "1c0cbace2fe308e657c62155c358b3abb3b90a08b2c78d11edc5ac81e28e169724b17c3b56413365e29bc1265cc2aca8fe2191f437e96c9627fa2679f247a0ff15c8e4379b21331d52be8138bfda0247c67708a18d3655aee718cae23ce2a754ec98"}, &(0x7f0000000240)=0x6a) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x400}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000005c0)={r2, 0x80, 0x10001, 0x6401, 0x3, 0x0, 0x0, 0x4ec, {r3, @in={{0x2, 0x4e21, @remote}}, 0x3, 0xffffffffffffe1ff, 0x5, 0x5, 0x4}}, &(0x7f0000000440)=0xb0) read$FUSE(r0, &(0x7f00000040c0), 0x363) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000840)={r3, 0x52, "e5b3a38c19de3447a0511ec09975275540495426e61ea2032c92bd8ba81e67674ad7ac926027a04a1df5c964a962ce6222181fadc918fa81f685f3a2ecb8a06f9160b446c506ab0f5141bb6a4f5da2acb22e"}, &(0x7f0000000200)=0x5a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) [ 1372.367334] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise_type. [ 1372.394105] ntfs: (device loop4): parse_options(): Unrecognized mount option smackfstransmute. 10:27:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x68, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5c5}, 0x28) 10:27:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="801919192c00"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000240)='./file0/file0\x00', 0x200000, 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343063757365725f69643d000000000000000000000000bb2d4b9f848053a9c75679190091e4d34441fb06807ad41b32865c9ea415d9242abee5e1830af7b22466730b2acf827fd3d018b3082447ed6db3da32ffad8248c6367ad6c7ed70072d050f6e3e482eeec0e543a6cb8916912704f8b2259f4b61b91e7080a9f7b538da728756c596c0663f4404db78dcda6657322675d9dcd46110a95bcc10492de422ab914eac6debf6c88c72f0ca00f4da9d964579dac29d04ec0b3129678143cb7d1a6d8622d633b9d774cd3b7bdfd68ec8d42ed714ab3386af9b07", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f722c0000400e00"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socketpair(0x1, 0xe, 0x401, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000080)=0xffffffff, 0x4) fcntl$setflags(r0, 0x2, 0x1) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x5) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035665025e3000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdec}, 0x28) 10:27:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x38, 0x0, 0x2, [{0x2, 0x400000000, 0xb, 0x3, 'allow_other'}]}, 0x38) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x93e}, 0x28) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x38c}, 0x28) 10:27:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x81f}, 0x28) 10:27:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2a}, 0x28) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x57}, 0x28) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x188}, 0x28) 10:27:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x16600000, 0x14001) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000240)={0xb5d, 0x7f}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) write$P9_RSTATFS(r2, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x6, 0x20, 0x4, 0x200, 0x2, 0x1, 0xffffffffffffff8b, 0x0, 0x80}}, 0x43) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7, 0x300) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x31) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8001) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:05 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x97e}, 0x28) 10:27:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x77, 0x40000) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x1b2, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}}}, 0x88) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa15}, 0x28) 10:27:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:06 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xaec}, 0x28) 10:27:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22, 0x10000, @dev={0xfe, 0x80, [], 0x17}, 0x1}, 0x1c) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4d8}, 0x28) 10:27:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r1, 0x0, 0x1, @ib={0x1b, 0x7603, 0x2, {"ee740326924db75c88e1bf99daa14cb5"}, 0x3, 0x800, 0xd746}}}, 0xa0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f00000040c0), 0x1000) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdcc}, 0x28) 10:27:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1cc}, 0x28) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9b7}, 0x28) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3fc}, 0x28) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x39d}, 0x28) 10:27:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x26e}, 0x28) 10:27:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0xfea8) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) lchown(&(0x7f0000000040)='./file0/file0\x00', r1, r2) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90001a0000000000000000000000000042f4fe358ac36b000000000000000b00000002000000656d664b3732f31bf6e13a316e6f647476076d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b637875733595bd65744a67726f7570246367726f00000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="070000000000000173463decd2f59eaca5c323cb926965ddb66f013429ee1c769e741be31e5044288bd25ec363711575de4c745d96bee3ecbf41db5494b7b2fce8298ed22dd92b7008"], &(0x7f0000000080), 0x0) 10:27:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c00d237e2fb0810e75d10724112a7eca85b9c5d9786be689989558aacff2cba5981e66034e406b216232c8b1f83f9efb927d8a456fe3b008792f6e37903f45858705952b281f8812201cebe8b7a5aeb9c00867d1acda069515ccc688cf349381258ab1aff5e9296811a93a496c62500df4b70a1b1909ec37e27671d9ed68b6b523767aca8082c9ef1b23820ea900800000095162bca9aff35537c5f632cf32a96dbec74b621b49c3969142c4c6abcfa947d48e7bc4321e22a6f219f16639eaf0bc83eaea915784ef522b57388150fbcf54cf9c1b6afbece1e1ef0425e8230d5f67bb4fee54a18b63b"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x0, &(0x7f0000000180)={0x2, 0x3, 0x2a4, 0xffffffff80000000, r1}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400101, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000240)={@dev, @remote, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f0000000340)={@mcast2, r3}, 0x14) preadv(r2, &(0x7f0000001a80)=[{&(0x7f0000000380)=""/94, 0x5e}, {&(0x7f0000000500)=""/111, 0x6f}, {&(0x7f0000001980)=""/217, 0xd9}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000580)=""/33, 0x21}], 0x5, 0x63) read$FUSE(r0, &(0x7f00000020c0), 0x1000) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000600)={0x3e1, &(0x7f00000005c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000400)={r4, 0x20}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r5 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="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"], 0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYBLOB="00100000d2af76ccaf51afc116c5b52f4cb53a7dcf312c92a71d7eef5ad80a8347a97b90a7a8d7d238655857875c91295f6afb5ae098cfc4178d0c6f213fc4305ff17354702fc44a67f317590d9810f4a7579df79de7f441f9cd7b8b8c8d5d6cf2f248ba036462049a8f02e3b1a17701a1f81875044d8c607e3b14aa0c1b86d8864321425d7f0206b31c8d2698d1cba3b218cd513d2b115e0488fc8670f884a4a7200750f9b8727f8ae1a27f393ea223c8df6f1c841256855024a7d7146e90e7f3af176ae52e98e581389513000696791be306cf4ec563ca08f370d6156ce28cc4721b5786ddfd46671bd50fadf6b47d46b4efaffef7aef6b8995c8948923879e49197c83fffef7c96c5c8be9332acfd7faba5f7f01305d130aa863b34a74a998245fbaf5c393cb2c3d43b2d9d037c44307e37382b6c749bf11cf4b35e6ac37e43163aea2d253f3bb7023ac50caa0b7311c6f899b3acb7100175e43dc4db2ba7bfa37dd76ef7b49f389162bdd5a994c2e2a72214b76f4695367c3d82a079ef37a12fc96717e3416edba0b0e68346b2ebd9eae95012cd495fd8934f6399888c180f804e3201b4a7c46c09f3b2b02312031e27a88ddd6e8a2d53967e98c3b530ff333c55e68603e4451d623f811fd1b0d0dd922f8b9bc320e9047fb7592598121a2cdaa07f9248264f7386ca6d8a08ad748e7e7bf4b11e14e263343ad69c8551c88449faeb813b925a71fa1e9320371f2496e9958f7d4410cb0d5acf1f0ab24d9b7283d23844a8708db3ef4460dc805df93db91fc42f34566c9e660d82accf2cf54ef569cf1a0e1dae12eb3382bce795f0a2d7a4d1c6707114acbb5c25c7d622970735d3ca4829796661b137fa02790b775dfa204d089b8a5bbdb681bc95e02ddb6b5e38cabc8e427efb8ed4c4df31a34fa19d8aaaffe7a858fce710d226487711dc4d3e5a7fd618b053efed5dfbaa7d346fac78eb19f5f5a091e894803f0e9005f667e1acf2407225bd56792f393bb6d1f84bb1593313646281320d4b9ca6a93714ffd58d0b9dc9d30692a64f2bf13bc433f92bddaba3a72bd86f0c3b650fad559596cf74ac249e9fc305b474143ea819a7f4657ffdd8c1e27e18d13201b11f13d3ae537abd152a9203a26dd026a02b697f795320fda773788124c659cdbf0c216b5811a5a12c7bbd887376bb79614d73aa3ea468c6c904d5486f757c15f560798139a0e3d0b6ed08d97479f05873d4a242ad2cc3de4dfba911e8ec6ba24c138dbc58a97d87454d4d30f8e31ec012245d5aa39663363029339bf042322fa2b0e665dc87b8d03f22605b36ac1c7d31bb88d7d5e7f20636e61926372cb13926513dd7ed83e6e2cd952d32f4a56a2ad4d073ac187b981b38d6a9a2fad81aa929725701c2b2c93d75813f03321991924e918322fe4fe75a55fda16756f540d8b7094a45812b2c9152671434cb22bd5e7812cb7c3d23ace33752f135429d7729443edc56fddaec83e11edf45bd9af104b282fca6033aee3ddeff2f12bafc936838bb57431ff8e56824f7e6ff4c9250627a349ba0e64cc3c4b60fdef2c24a1240cb29d2bca52926a4592375cf670295b43419f76316c91d28e181fb62a99383a2a50f472514e5716b4edbae995548c9ebff465047dc1cd9b2ddb2ebb43e7b90eeec087353c473b17254df3c1fcf72ff1ac49353be09ad4d294153cf1bb75b73f39fc8c3beaa9f301c7f9d48ca5e322f2a459eae37f83a8c816d2952e3b3b13b4a57b03cd1e5e337275db7d13876bfb84c4d7814f58c6cb2b0e5ce7d2713043fda095f6ed16159cfbd7206509154b4f0ea56ec79f6bd6d452287f3f9fcc94c62cbee7d08325ee915ec565c0f47af72d7b3e016372808570effe8449f1153093697aeea96fb7b90458c07b105c1b90a2785a4fdef516efca388104fcf550b87f85f0fd0c9316f5bf9e76255d2e4a6375e51e9e4d1c6212426ff653ca28ea19a0446d348eda5b69186335374849ed079b924ce0f8ec07935e318dec75dd35faf1688f721b1a95882be052e9a3a5f2af9f4f23b60b2b1f72d397b762a27ab944b87f47b3e148d5eed7e03174a2d4395a8b4e7c7420b71eb6d7d7d1729af30b7c9d57c3ed25b06e176c2d1cfba5a4ac7d2714d6fb50be068491a68519152c27ba8ee5afd33def07c443cf1d3452ab4d330817096923743b8535f05a48c2c88bd05ed173b93c4667aa44f13b7b525eda13476369c612a21aef7054ec2fffe0a20ca1b01263818fadbd19484812847d12ae49b8529310c954b62ea9b89a8195bb6f9e2de8fef43717d9a8ef6f024849b78c9e57071db4d06541c3e3139538b15821e60a390c53acfa00ea8071d44816028939eb6c8cfeff1dfa5cf653282863f9a64e2f2e02652adb85e9e0710c5c6a965af1291bc93c198f61c4674140c8dfca93c3abf1c0d1c57da1ed1929fecf98eae29ffbc0e72a12b567b155f8412acd6d7194a5af70e6820575cd9cc59c6c2057980b4d4c28f193723ba299f83ba6e98c558c15e55e208cf531abb6e488db022347ac3b3ed50f1e89ec96d7e44a261e210472321395950e1e3e870dfa3ed578abaed3032b5e9cbbca10626bc3c0999d99fdc7ecee7d9330f04e51e6205943875c9d916687a3b2da4668d827a52ff4f5ad569bea5e597036eee1a205da1da3a6d0fa7e339ca08e601dec2bd15e9e9204ee8da94d4ee7a0eabf06a09948d499b3b8759d141bac7ee4226af0d904bbc56d5695f2b4ca15fcb6a812532d71637433f49c1e987f0cf77c1aa5ce7ae56e01bd1305d0f216185c431f3ef03a8cae7f03334088d23a4eed33e7b011d37cf417a9b29b270d205fb1758bdddae69d309b07d50903d186985cee1553a75b893b79922b48f09acf6733872bae2c0573abe1a9892ba4afcbe089300fd8d9532986f39446ebc6f3ef202dd50d51ccc84c871e5f68ac42fea6444cb3c4f61668708531d0e548f696f0511f0ac3363d8f577975461ac102aed83f2b99b591e4d70f35857b31eb833149c582ca9e8a37e55c07db3238a57da54371cdbbcc14e20c5e9cd62f773fdbe1ecd8e6f60a52ed574cb0fd7c2825e113136199cbca2f5b8cc948c53bc06a35af779d2c1c914bb338fb8938e81b904e5547eaef416cd6cc0bb802f93fa392c9f79763341f45c3852d7d3da7c939b16ce81fcae8c184d32203dfc56fd725194ab1de9dfbd744c23093a7c50a1a32fc76939a2f4edf7fe8d42e0eb5a484ae133831e3ebc338740f341857e5961ffd2c720c63fb70b2e8e0056d563c7bbc4d5cd7a670adb5f6e1ece20341e92fee76e6e787db0932e34cceb7c51977548bc0fd41f26f9cc642298282dc04ecb58978f09642bfe1f4814665c035cb0e5301ab96d6f80cf8cc20db5148d96fda47a8b2ee16c21648e41ca725621c3f8215fc36aae7913ae87fdbea5312ec4b240581ce5a3307408984b1167cceb127e64e8769e002cf80a6929a1a1c158bd61cd011d951d0cd532a67628579635868f07ed64eb78a9caeb821ce330eeca6196ba9da2a11c666a825c351fb7194e3cc1f328646d2febbdfc0a597d8357c7ae86989284cc23d566e5d822e4235ab455f7d2250b035a140a996d5e6e1c306459182f9a920bcbba73eeb67ddde427a29866992b925ce1e8824c04e9ff1e92a921bd54faefcc63f01e55de19db6f3b06ef76992d2899df417d79c8ecec117a54505b47f3994d4ded89acc8aeb95c0ee1c078e8ee0d2699b55a9f369202f627b33e1aca7ec2d5046a2d88638dbf9b4a46250536e8e8489e1f5e2442de17e73fdbea35de17e9889a99de5879c34d200cb93717cf4eacac4e123585f9447e7540c262a9d3c59587c8edb0ebc40482bfef314c15b88020d6c931a82d5e4f5fcbd6ecf603422a78bbc5cde1e7c73ede3151b3b32ff8b110a0603b33f9f2bdda4d8d8e194b99b5abc37e6121d698c7fc723b235c3bd9549827271a4f38a7a1369f57e96ce88554df0fe8ae92b88e832cdbddece489ab2ad3bfab4530a72faada1637ff7572e22cc6a82b62e530d91d37313ecfa578bac74c847881dafe125366ff78768240183c5def0318e37166c0ea79545b40aba392d5ccd16b2c45df50eead9e945f1ad9e7c0d4475ff512ab6421034dfc1705d58e538f4f6b7409e7d1ab8ebb7f64b7041e5756c01cd0f15377ab036491725f7e9a27bea7c192aabc9c5c764dcd08026f67deb5107a1155ce0eabdb789c7248daed7f02f648bd3dadd1b9964c852ff09044af0142eb96376f29c2b6ed99e4176206952735d97c69e585e4105f1565f4881596b4d0d444cb450325a739a00c7d331054abf0776b8aff3969bdcaf885293df6e9b533fc4df5afcff9cdd5dd7874d6e93f58b9b29a15d571b41aa63e829e264ecbf02516c78ddc4e62f36473c1699b4699f694e85ef08a56a08ef8ed553d0b3e936f5ade66b220f676c0b3cd6d5566233fb7030db250d0d5dd1addad746f45369da187445ae2c3bc34165036faf8456b44a2bdcaabfafbaa82b3ac6fb96b00c45bb7806dc05222c340e794aaf6fee52cb836973e9599de3f892558b4ecba5217e874ac306d5b5976f86a570e45f1f07c8d776b6b1947e7d105d38eb7b73dc79cc2836c24d120ca6d6c04dd728b66d9788c4d21a010d91686100192d7cfc22e4b8f2fc01332f62c32a6f0ca972c354335c1e5c7055a3d10c47865699c4adf43c9981c99a0622f8f81f959ef170e3ea95dccb3e7dc2aac450f9bcfbacbe0bb9f4ea504269b996153b3a306ce596e7a5037ee2c2b5810b94ab79cf0817dbe5b1f460a1857b5bff7b787c8dbb255282e92a366ba8aa9170d545796cdaa20b6f2a94533276596c640d4fdb1ba07c1371f9a19f549e6b7ec898d9dd36c16c5a9dc250c147005a2fb841733dcc18252e873324d49d3385b6cd3a588c2b95e17eb0e3a421cbb4f7bb0fc5ac9b8dd8198608f4c28e4b9e0d8764dab472497ffb7291fd9b151d5d6617ec5ac08d452cfa6bd8dcc1b2c11efe02db9f176fb2884422a908430cf4d69f2926350c189759205374d5d560a37f153beee9289a8f4bdd2999c9c21ebd25fd85b284cbb9ff102dce424cdc2cb8e6557de1001491846df1e079e82595e0f9e7d1499d507c588699ee342c23476dadea3047ee738c3031b344df68fe7ebbe016f2355bd705ed6908efbf26b73f2fa90c340be30204593d4377e65257c599ab7d89ec6dd4d256cab22948cdce89eedda00ac9cb2891857f9895f5e6e65091a60ae45c9d8f09137dfd72f4123be02a859639286dab7c1d5afd78ff3b2c6bda3b29e0d8cca1c497687cb6d51327af920c901cc81d237e4958bf508a6c6eac96bfe3abb3a0ae05e74cdf9b06e8a1e530e9f825c7a6f2ebb81c28911bd5227d2ac7fb033507c325e90d37b400fbd3c66678cff8c70a2d9e7e1297ebf8a6545cab6685eaf17658bf4000203c38a192a98563e791f42f9518e2ea8ba19abc18f4537b33777a97e6e4df5b86a84e0170fa680afae562b1fe609585f3861128e516436ee109931b18d288d9a486a902b51ccb3c45bad331a36d5c872da6e3ebb03908c9af3f3cf40297a34aae27628c3f22f4177e184e3d6781ddf378bde34db81edc5887461004f558fe6b16803af955c9234727068908074e013b59d324f8c2dd75a5e185b4a0da392742ad70622971881474cc9ac62e460eaf3963dbe179765a25fb79041a17e84f2eb56c215a2bfbb34af23ebc449d7dd4c743a77d6d57a9f8e58b09b0773ad4cf03ed3aafc440b9bfb0a08eb83d9d93fecbca8be"], &(0x7f0000000040)=0x1008) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r5, 0x84, 0x78, &(0x7f0000000080)=r6, 0x4) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd2f}, 0x28) 10:27:07 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x61e}, 0x28) 10:27:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 10:27:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:08 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1c3}, 0x28) 10:27:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9ec}, 0x28) 10:27:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0xf1fbe1e0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x2200, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000001c0)=0xfffffffffffffff7, 0x8) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x200) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000080)="a2dfcbebf9155c8a1e7b5a1e7cc74fd3f445d6a3f981bd248ff4b54a24267ac5307508e027657b762c777be12cdd") write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6ed}, 0x28) 10:27:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) 10:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x409}, 0x28) 10:27:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x25a}, 0x28) 10:27:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1c5}, 0x28) 10:27:09 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x884}, 0x28) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb76}, 0x28) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x424}, 0x28) 10:27:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="063d73cfe0000000"], &(0x7f0000000080), 0x0) 10:27:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="66643d02c329e818cfe1edcb8f794bba7c8ae0d2ad3b559271b59a55c4a25a74b162478d6223588a601acf504714a4433e010022ab6f1830a2c7456cd94bbc41e72757dd3224e7d4bd8d0f69", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x111080, 0x0) bind$bt_rfcomm(r1, &(0x7f00000002c0)={0x1f, {0x1, 0x8587, 0x1000, 0xb87e, 0x1, 0x9d0}, 0x4}, 0xa) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x801, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000180)={0x4, 0xffffffffffffffc0, 0x7, 0xe6, &(0x7f0000000340)=""/230, 0xa, &(0x7f0000000080)=""/10, 0x9b, &(0x7f0000000640)=""/155}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000001c0)={0x8000, 0x86f}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100ffffffed0000000000000000000000000001000000000000002c0000000000ef0a0000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x48b}, 0x28) 10:27:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000"], 0x48) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd31}, 0x28) 10:27:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000340)="5813263353b66107c5720a0da7c33a8d5cfbbd66a9cd8aa9ba06ea9acc496235e8fbba8d5ff242096247017852f9905377b4d032d598ec65a6a6233c3adfdf30c2c9698d3fe5e23cef48368819e2103b84163e8a1aaee0b682b369a2960da0dd63254459c190cbe48ab1dbc4a8c40f71dd3f495b58e2e14003bb90bb71959e87394530bd30a85edff6ee2dd9903e6446ca7d0a2d1f795b79f51bc04e8c0a3a5d7e1ee13439cd16d98a8e495a", 0xac}, {&(0x7f0000000640)="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", 0xfe}, {&(0x7f0000000040)="1ccd21925c9ef190a05da750c6a215ad6a4a5af9ead13e38963969a2df74b910b76df4076441", 0x26}, {&(0x7f0000000740)="ac134d3a3d8001a6cc48235a7edda907483e6435f6b8d514c00278206c2d22637b670fb9a8654d9661098ffc4ae83b957c9c17c9c6fce34a156088a986dd9f9fa8d051395d0b7409c88b9126c4f6c45fd928d173f5e7e5c510e8d14ffa99c58b1da1f5d301eb61d24492c878a6aa5c11d3af0414835810ae9b745f01a16404b50e95", 0x82}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000000080)="d55a518b49495b5c99176630f0c534088252ac9cd092fb04ee8ae4e6f9e20ba3c713a36685507e2cc2", 0x29}, {&(0x7f0000000180)="f387392d1bc2ebede3434e3d6da7eecc39e90edca8b80da2bb1fd2c8cb91ddbda7802345fc909ae83d8299cec69b992315147c6074b297e9363b27070f9efa7770e7170dab290a6d4fe008621edd782255484ccebd59", 0x56}, {&(0x7f0000001800)="743520dc04e4539a100575c8675905cf889460bea0ab473243f31835a2db5d161540b598cc32631c6a0903b29e0c02eff8165fa7f827e2b0f011781f8157ab5353565b0c8a7e4054b4ead8840f828e78d3167e2acc8f99137fce24ff74a99cc5ab10fb9a1db7fa821dd898dbb205d692050aac32d7aa49110498f5b37c14f9cabae7d3a45a2bdcd313caece0eff0", 0x8e}], 0x8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mmap(&(0x7f0000dff000/0x200000)=nil, 0x200000, 0x2000000, 0x8050, r0, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000030c0)=""/4096) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000240)) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa60}, 0x28) 10:27:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) [ 1377.981192] audit: type=1400 audit(1540376829.967:124): avc: denied { map } for pid=1362 comm="syz-executor4" path="/dev/fuse" dev="devtmpfs" ino=14818 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=chr_file permissive=1 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdf6}, 0x28) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1fc}, 0x28) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x287}, 0x28) 10:27:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7fffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000240)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, 'fd'}}, 0x23) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0701000000000001"], &(0x7f0000000080), 0x0) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x70f}, 0x28) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x78e}, 0x28) 10:27:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc"], 0x6c) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x86e}, 0x28) 10:27:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x6, 0x2, 0x101}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x13a) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x7, 0x0, [{0x10000, 0x10, &(0x7f00000001c0)=""/16}, {0x0, 0x1000, &(0x7f0000000640)=""/4096}, {0x100000, 0x71, &(0x7f0000000340)=""/113}, {0x2, 0x72, &(0x7f00000003c0)=""/114}, {0x0, 0x3e, &(0x7f0000000240)=""/62}, {0x10000, 0xc1, &(0x7f0000001640)=""/193}, {0x10f000, 0x84, &(0x7f0000001740)=""/132}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) poll(&(0x7f0000000040)=[{r1, 0x4}, {r1, 0x220}, {r1, 0x40}, {r1, 0x100}, {r1, 0x61}, {r1, 0x4000}, {r1, 0x4000}, {r1, 0x2001}], 0x8, 0x6cf5) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x58d}, 0x28) 10:27:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x49e}, 0x28) 10:27:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xde8}, 0x28) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x867}, 0x28) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x7c9}, 0x28) 10:27:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="204baa2fa353b862ab520578adb147f4f3916376b4c2b0547ee5717a17942fbd80cdc1d05ea44b44969f4719927f605bb8ca0d12568700", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303004f33430be5f86041bc9923030302d757365725f69643dc4f8d62cd3a5fcc1592f5f87935a6665cc2adfa873ed783c699b4786cbb40a6b053b5e6bac9e633e4a16adcd0c02e81b1566120246323389f70f204b87f046510415324ed92afe773ad1d74e78d403370da64af7e5e9ddf29a873279425be94c04f49205000000000000002e03795c6ff3344bb2ab25ff1c937d0106ce3140e363d311ea375feb3c4c623f440dd479ce5016999b26b102ff4eda51080200000000000000bca0e5cff2f1e317701d75baa2425eaa883f95a3303bb91986ceb4f388d43a229a5bc411aa4d27344e3430164e63071e207700000000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000340)={'nat\x00', 0x62, "9d3377a3689c781e383fd1c988a3a842fee539d82650514b6b20eef43000b19b9d87156ff8249ee7ec7380023ce8ab37f57fdaee5e1392c48acf5a8b772f21e2f090d07dadcc51bb98a01b0e96fe7a993830feca5f10983c5dae318aca3cc0c2db4f"}, &(0x7f0000000400)=0x86) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x10000}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000004c0)={r3, 0x6, 0x3}, 0x8) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r4 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d310000000000000000003dff6aa300000000000000a6007d570000000009000000000c000000000000002b73797374656dcc636975733595bd65744a6772727570246367726f7570150000000000000019000000"], 0x8a) rt_sigpending(&(0x7f00000001c0), 0x8) name_to_handle_at(r4, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) mq_unlink(&(0x7f00000000c0)='em1mime_type&$lo[@&*\\&%}vmnet1lowlan1+@nodev&GPLprocvmnet1\x00') syz_mount_image$f2fs(&(0x7f0000000580)='f2fs\x00', &(0x7f00000005c0)='./file0/file0\x00', 0xa5d, 0x8, &(0x7f0000001bc0)=[{&(0x7f0000000600)="5ff2979fafedb0b58faa1aea5ead9716bfe932fe183961a1b1b9ba8d957be5147f7c346ca731ababcfde6f1150fbe5b0d36f39d58fddc03830d870aca920e49b45b4e114f30c9530bd44001d152bbe3ac66cfe7cb333a5aa2fe392c59eed3885ffc8dec8c76ed50a40bfa6ee762a93167251939bf6cdaa9a7ed13fd48126546fdacbd803b360ad5393bad0d5b20dd10cfd260c30531f8b95fb47ac8c22849aed9195a70b718f5f7b15011e72e396e699b6a83e8c21", 0xb5}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f00000030c0)="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", 0x1000, 0x4}, {&(0x7f0000000780)="112f3a7b4b6901a7b1a4e46897bff94c5a7377d8674fc248d8578a4f33696dc5c31c9768e17757e0b0a8828895f81a340b04bd333694feaad5fb9339f793bd85c5d5df15997ab403edd43bc51b886dd148325b7e1d59aab4e7f0e166669be621e450134136a991ed710abd51d4b3484022cebb874f5ae4", 0x77}, {&(0x7f0000000800)="839f7dbd5a1d83ce2c401e4930924148ac1e02b83e38459bf492fa14122421052a9320d9b5d322a1aee32d89c99325caca171cc7c6c9d58eecdc8bba2590eca4f42df857cc0aa3a47fc41f2e2b46b30f2f441028c0c8010a5271744e96e0a1519f31f73d296ca6270c6c7e8cc4186480926fdbb16d3877095f0d5775dfdfefda854e664a2981ae4852d89865a29aa8113f7d2863dc9b395f66f1fbc14af257f951adc465cf219b2b69933aaccf55d6e88ed5dacb26", 0xb5, 0xfffffffffffffffe}, {&(0x7f00000008c0)="1a8544342c07a5c9c0cc96cc19d0b201299aac67aadac86e593b9139d794849117a1550b212a333066dae543f80240ddafbf97264d7582b7bd76c669d7c663982005fc713529efab8788e5d505a79625b3de4fb3f576dff449b8e44e033799b3", 0x60, 0x101}, {&(0x7f00000006c0)="a0e99df27cdd7e9ae5257587dd170024e4e77ae7844a11bb42ba90d877aaf533c2b5036a8b88bd449b6b810de6023748773068424cbf0d62", 0x38, 0x400000}, {&(0x7f0000001b00)="ecf68af1904f18b0f7ae0fa22d400597ad1dc9718753879a9b110c3752763b4162159da3d07e9d033e3c5680b5141438b31318de2c55b34ab6dab5db143ef126c216684de78a94a4e531f6af276cf66a2deae936327b2d7b91cf17ecc787eb29d0ef82b9c9bc4eecaadc9d3f43aa66511b065fa5797750f3ca2478da1443bac33d39ea7b78ec29d69aa16695a10b98b69d2d1b4f8c8f11182d5ce9690dea9935cea61a8048ec2e191f307d3ae622e11c8790aa013ad01c479bd479ca55f58dc4", 0xc0, 0x7fffffff}], 0x1200809, &(0x7f0000001c80)={[{@resuid={'resuid', 0x3d, r2}}], [{@uid_gt={'uid>', r2}}, {@fowner_gt={'fowner>', r2}}, {@fowner_gt={'fowner>', r2}}, {@dont_measure='dont_measure'}]}) 10:27:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367"], 0x7e) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x608}, 0x28) [ 1379.390817] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x6419e297) [ 1379.426989] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x24}, 0x28) [ 1379.455306] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1379.463792] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1379.472378] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x6419e297) [ 1379.481492] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1379.489640] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1379.497383] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1379.572208] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x6419e297) [ 1379.588311] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 10:27:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0x126a) setxattr$trusted_overlay_redirect(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x3) r3 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x5, 0x8000) write$P9_RWALK(r3, &(0x7f00000005c0)={0x3d, 0x6f, 0x2, {0x4, [{0x20, 0x1, 0x5}, {0x31, 0x0, 0x3}, {0x83, 0x4, 0x2}, {0x2, 0x1, 0x2}]}}, 0x3d) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r4 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r4, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0000c95755000000000000"], &(0x7f0000000080), 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0xa, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75705f09a60fdcb7af7c19292f34abc66b4422284866cb65c3a7c41f3068c81ee265faa70236b590f1c49b9ab993cbe06372724e4c382303a7ee78e9a0605c02646ac9ae46ae4138af311ffd447bbf698a002475fc6e22ce3838cfd642a0c4c00d047c5c", @ANYRESDEC=r2, @ANYBLOB=',max_read=0x0000000000005497,blksize=0x0000000000000800,blksize=0x0000000000000400,blksize=0x0000000000001e00,blksize=0x0000000000000a00,euid>', @ANYRESDEC=r1, @ANYBLOB=',\x00']) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x926}, 0x28) 10:27:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000340)={@vsock={0x28, 0x0, 0xffffffff}, {&(0x7f0000000040)=""/115, 0x73}, &(0x7f0000000180), 0x16}, 0xa0) write$FUSE_DIRENT(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf06}, 0x28) 10:27:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x345}, 0x28) 10:27:12 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x5}}, 0x18) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000"], 0x87) 10:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5d4}, 0x28) 10:27:12 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5af}, 0x28) 10:27:12 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x100, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000240)={0x1f, {0x36, 0x7ff, 0xff, 0x9, 0x1, 0x3}, 0xb5cc}, 0xa) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 10:27:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmo000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x8}}, 0x18) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x8cb}, 0x28) 10:27:12 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000240)=0x2, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000000640), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xd3, "e77d1ed3ab59c1ab8606982c764f88491d6de2675a0794777a3a26d15fa8b840dfdde7e524b6b9f9f96bbfc8ef7cc13c2542dbc7f8a6af657bf00b6429339f7a6cc3369743a4420515b1e93d626be3de7389b8f495261694743df887ff00f2027f372c0b9c52d20e7a0890f079e27ad50cbce9b225a6db00a01e2fbcde742f5a3e3e8aab90c5530716d0d1b6d1ea2a90e8735516f545ef0a0270554fcc0d7a8af301142d9a7216b79ff5f47707cea09b6ff477710209ef1a2c805e2dfdb1b5728f833c04074b9768484f8e1a88685e20d636b1"}, &(0x7f0000000040)=0xdb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r3, 0xcac, 0xdb4, 0x8e, 0x1a, 0x2}, &(0x7f0000000180)=0x14) 10:27:12 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x38e}, 0x28) 10:27:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000"], 0x8c) 10:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xf5}, 0x28) 10:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x647}, 0x28) 10:27:13 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc0c}, 0x28) 10:27:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) 10:27:13 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000240)={'veth0_to_bond\x00', 0x400}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000040c0), 0x126a) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:13 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x668}, 0x28) 10:27:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2a3}, 0x28) 10:27:13 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x20100, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000240)=0x2, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000000640), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xd3, "e77d1ed3ab59c1ab8606982c764f88491d6de2675a0794777a3a26d15fa8b840dfdde7e524b6b9f9f96bbfc8ef7cc13c2542dbc7f8a6af657bf00b6429339f7a6cc3369743a4420515b1e93d626be3de7389b8f495261694743df887ff00f2027f372c0b9c52d20e7a0890f079e27ad50cbce9b225a6db00a01e2fbcde742f5a3e3e8aab90c5530716d0d1b6d1ea2a90e8735516f545ef0a0270554fcc0d7a8af301142d9a7216b79ff5f47707cea09b6ff477710209ef1a2c805e2dfdb1b5728f833c04074b9768484f8e1a88685e20d636b1"}, &(0x7f0000000040)=0xdb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r3, 0xcac, 0xdb4, 0x8e, 0x1a, 0x2}, &(0x7f0000000180)=0x14) 10:27:13 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000"], 0x8e) 10:27:13 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x2e8}, 0x28) 10:27:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd6f}, 0x28) 10:27:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0700000000000001d84682cac729e39ea352cee43cb97cc1135dfa0bc434d642bb"], &(0x7f0000000080), 0x0) 10:27:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000"], 0x48) 10:27:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xacd}, 0x28) 10:27:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x6, 0x2, 0x101}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x13a) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001800)={0x7, 0x0, [{0x10000, 0x10, &(0x7f00000001c0)=""/16}, {0x0, 0x1000, &(0x7f0000000640)=""/4096}, {0x100000, 0x71, &(0x7f0000000340)=""/113}, {0x2, 0x72, &(0x7f00000003c0)=""/114}, {0x0, 0x3e, &(0x7f0000000240)=""/62}, {0x10000, 0xc1, &(0x7f0000001640)=""/193}, {0x10f000, 0x84, &(0x7f0000001740)=""/132}]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) poll(&(0x7f0000000040)=[{r1, 0x4}, {r1, 0x220}, {r1, 0x40}, {r1, 0x100}, {r1, 0x61}, {r1, 0x4000}, {r1, 0x4000}, {r1, 0x2001}], 0x8, 0x6cf5) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x128}, 0x28) 10:27:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000000000"], 0x8f) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb58}, 0x28) 10:27:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x223}, 0x28) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x823}, 0x28) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3b2}, 0x28) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5aa}, 0x28) 10:27:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc"], 0x6c) 10:27:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)={r0}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x5}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={r2, 0x1}, &(0x7f0000000380)=0x8) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x121}, 0x28) 10:27:15 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x673}, 0x28) 10:27:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:15 executing program 0: lsetxattr$trusted_overlay_redirect(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 10:27:15 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) 10:27:15 executing program 0: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000003c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3={0x0, 0x100000001, 0x0, 0x1}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) io_setup(0x0, &(0x7f0000000540)) io_destroy(0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:27:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcc9}, 0x28) 10:27:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x1f}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000020f, 0x0) 10:27:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x400000000032, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5414, &(0x7f00003b9fdc)) 10:27:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367"], 0x7e) 10:27:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000002c0)=0x45d5, 0xffffffffffffff58) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r2}) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[], &(0x7f0000000240), 0x0) 10:27:16 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) 10:27:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x400000000032, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5414, &(0x7f00003b9fdc)) 10:27:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe2c}, 0x28) [ 1384.476724] gfs2: not a GFS2 filesystem [ 1384.550331] 9pnet: p9_fd_create_tcp (1806): problem connecting socket to 127.0.0.1 10:27:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x4, 0x400000000032, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5414, &(0x7f00003b9fdc)) 10:27:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x301}, 0x28) [ 1384.758611] ýK: renamed from team0 10:27:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x404}, 0x28) 10:27:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x206}, 0x28) 10:27:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x32}, 0x28) 10:27:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000"], 0x87) [ 1385.138735] gfs2: not a GFS2 filesystem 10:27:17 executing program 4: [ 1385.223714] 9pnet: p9_fd_create_tcp (1806): problem connecting socket to 127.0.0.1 10:27:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) tkill(r2, 0x29) 10:27:17 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) 10:27:17 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) 10:27:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3db}, 0x28) 10:27:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) [ 1385.514737] gfs2: not a GFS2 filesystem [ 1385.542964] gfs2: not a GFS2 filesystem [ 1385.597558] 9pnet: p9_fd_create_tcp (1874): problem connecting socket to 127.0.0.1 [ 1385.617960] ýK: renamed from team0 [ 1385.621250] 9pnet: p9_fd_create_tcp (1870): problem connecting socket to 127.0.0.1 10:27:17 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) 10:27:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xddd}, 0x28) 10:27:17 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) [ 1385.762907] gfs2: not a GFS2 filesystem 10:27:17 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) [ 1385.858539] gfs2: not a GFS2 filesystem [ 1385.893318] 9pnet: p9_fd_create_tcp (1897): problem connecting socket to 127.0.0.1 [ 1385.941571] 9pnet: p9_fd_create_tcp (1913): problem connecting socket to 127.0.0.1 10:27:18 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, r0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000580)={0x80}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000480)={'teql0\x00', 0x2000}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000500)={0x2}) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000280)='./file1\x00', 0x9, 0x1, &(0x7f0000000600)=[{&(0x7f00000005c0)="26371fd55c23ffef736e9091dedcaacd9bc3f896dd6f432d956d8518b1a3ca3575be14dc484aca84d5b83f004e5c6f3cd85bc8c555", 0x35}], 0x0, &(0x7f0000000640)) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x6, &(0x7f0000000840)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES32]]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x8, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@version_u='version=9p2000.u'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x8656}}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r4}}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffffff}}, {@version_L='version=9p2000.L'}], [{@hash='hash'}]}}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c78) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) [ 1386.148123] gfs2: not a GFS2 filesystem 10:27:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000"], 0x8c) 10:27:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbed}, 0x28) [ 1386.215735] 9pnet: p9_fd_create_tcp (1925): problem connecting socket to 127.0.0.1 10:27:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000340)={0x7ff, 0xa, 0x9, 0x5, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="07000000000000010e0665bab00ebacbcd340ffc12bb8cc47d58371eae47ae2bcb0e4b80feb2b3acbfe31c6baf20179bf4fc76681786056c4d8a0360e9a580323e9873644a6b3edcf79d52ae4b66177f317f9acacb06101e82a9bb5eabbad32c44a953373817c63a23305bf0dc157dacb42f"], &(0x7f0000000080), 0x0) 10:27:18 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:18 executing program 0: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) futex(&(0x7f0000000300), 0x7, 0x0, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 10:27:18 executing program 4: 10:27:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x911}, 0x28) 10:27:18 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:18 executing program 0: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) futex(&(0x7f0000000300), 0x7, 0x0, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 10:27:18 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:18 executing program 0: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) futex(&(0x7f0000000300), 0x7, 0x0, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0), 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 10:27:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xaa7}, 0x28) 10:27:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f7570150000000000000000000000"], 0x8e) 10:27:19 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000010000"], &(0x7f0000000080), 0x0) 10:27:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4b5}, 0x28) 10:27:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffe, 0x32, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/142) 10:27:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:19 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 10:27:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)) 10:27:19 executing program 0: 10:27:19 executing program 0: 10:27:19 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f757015000000000000000000000000"], 0x8f) 10:27:19 executing program 0: 10:27:20 executing program 1: socketpair(0x9, 0x5, 0xfff, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="664cc9", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f00000040c0), 0x126a) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x82400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x50f3, @mcast1, 0x8}, r4}}, 0x30) r5 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) recvfrom$llc(r1, &(0x7f00000006c0)=""/207, 0xcf, 0x40010000, 0x0, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000c73959affd0000000b00000000000000656d316e6f646576656d3100000000838add910000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r5, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080), 0x0) 10:27:20 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb06}, 0x28) 10:27:20 executing program 0: 10:27:20 executing program 0: 10:27:20 executing program 0: 10:27:20 executing program 0: 10:27:20 executing program 0: 10:27:20 executing program 0: 10:27:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYRES16=r0], 0x2) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x739}, 0x28) 10:27:20 executing program 0: 10:27:20 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2}) 10:27:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:21 executing program 2: 10:27:21 executing program 0: 10:27:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xcf8}, 0x28) 10:27:21 executing program 4: unshare(0x8000400) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x2, r0}) 10:27:21 executing program 0: 10:27:21 executing program 0: 10:27:21 executing program 0: 10:27:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0xfffffffffffffee0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x4}, 0x50) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000600)=@assoc_id=r2, 0x4) prctl$setfpexc(0xc, 0xc0080) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x3f, 0x9, [0xfffffffffffffdd1, 0x3, 0x1, 0x800, 0x69693d8a, 0x9, 0x2, 0x2f, 0x0]}, &(0x7f0000000240)=0x1a) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x6}, &(0x7f0000000340)=0xc) 10:27:21 executing program 0: 10:27:21 executing program 2: 10:27:21 executing program 4: unshare(0x8000400) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xb6}, 0x28) 10:27:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:21 executing program 2: 10:27:21 executing program 0: 10:27:21 executing program 0: 10:27:21 executing program 0: 10:27:21 executing program 0: 10:27:21 executing program 2: 10:27:22 executing program 4: unshare(0x8000400) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:22 executing program 0: 10:27:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe04}, 0x28) 10:27:22 executing program 2: 10:27:22 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000040)='./file0/file0\x00', 0x200000, 0x9) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0700000000bfb8f5b600bf9c41925dc25d2933868892f8e1b5adc0af61da7bdd494d117a448a0d381c4ff8f0e0719a5d0545ab5fa48c303d4131fdae7767633d77f43053c22cfc96b2c7183b37dddf9f775513b780883ea1ddfa6f7de8a174aca1f73f0902d38e99027d140bba3d51710abd6c43b61508dc90b001d26b4c24322fb8ed0ef54dc42168c7e6ffc06460a2001a5458f6c983"], &(0x7f0000000080), 0x0) 10:27:22 executing program 0: 10:27:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff}, 0x20) 10:27:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a04000700000000090000126c036205005c0005debafc220500000000020020c600b2000000f73e81dd00000000000057a1fb00000008"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) 10:27:22 executing program 4: unshare(0x8000400) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r0, r1, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)) 10:27:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) quotactl(0x0, 0x0, 0x0, &(0x7f00000000c0)) 10:27:23 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x4000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@measure='measure'}, {@pcr={'pcr', 0x3d, 0x28}}, {@fowner_lt={'fowner<', r2}}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0xfff}}]}}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0x5) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040), 0x4) read$FUSE(r1, &(0x7f00000040c0), 0x126a) read$FUSE(r1, &(0x7f00000020c0), 0xda1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000740)={0x8000, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x0, 0x4, [{{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e22, @local}}]}, 0x290) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r4 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000200)='/dev/md0\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r4, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) fchown(r0, r2, r3) 10:27:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xea1}, 0x28) 10:27:23 executing program 2: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r1, r2) r3 = socket$inet6(0xa, 0x400000000, 0x7ffffffa) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r4, 0x2, 0x1) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) read$eventfd(r6, &(0x7f0000000480), 0x8) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000004c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 10:27:23 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="071400000000195b"], &(0x7f0000000080), 0x0) 10:27:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdd7}, 0x28) [ 1391.398201] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:27:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:23 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x188}, 0x28) 10:27:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa32}, 0x28) 10:27:23 executing program 4: unshare(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c616c6c6f775f6f746865722c00b726e08ffc27e205d5103e7d670a6db0eb4346c1fb232d3cb567c00bf882732446a14eba4bdeff1957e84893da1c68edca24a77a94e383474b46704a9746d5c34612991c12994542e9c92c523c852bca1fae86029a32d7020c5e5fc85819192f211753728a744996af086288bddbc821541450024bedc76025ab6662bbaf1a636959ecfb63ffa886daaf84a86ce738bf2fd7c3a94678db9fee4c"]) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40080, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:24 executing program 4: unshare(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:24 executing program 2 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc70}, 0x28) 10:27:24 executing program 0 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) [ 1392.282291] FAULT_INJECTION: forcing a failure. [ 1392.282291] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.294567] CPU: 1 PID: 2269 Comm: syz-executor0 Not tainted 4.19.0+ #79 [ 1392.301428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.301437] Call Trace: [ 1392.301465] dump_stack+0x244/0x39d [ 1392.301496] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1392.322250] should_fail.cold.4+0xa/0x17 [ 1392.326341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1392.331464] ? lock_downgrade+0x900/0x900 [ 1392.335617] ? check_preemption_disabled+0x48/0x280 [ 1392.340646] ? find_held_lock+0x36/0x1c0 [ 1392.344721] ? find_held_lock+0x36/0x1c0 [ 1392.348823] ? perf_trace_sched_process_exec+0x860/0x860 [ 1392.354280] ? kasan_check_write+0x14/0x20 [ 1392.358537] __should_failslab+0x124/0x180 [ 1392.362793] should_failslab+0x9/0x14 [ 1392.366601] kmem_cache_alloc+0x2be/0x730 [ 1392.370757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.376321] getname_flags+0xd0/0x5a0 [ 1392.380136] user_path_at_empty+0x2d/0x50 [ 1392.384295] path_getxattr+0xc3/0x1b0 [ 1392.388108] ? getxattr+0x2c0/0x2c0 [ 1392.391736] ? __ia32_sys_read+0xb0/0xb0 [ 1392.395811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.401179] ? trace_hardirqs_off_caller+0x310/0x310 [ 1392.406300] __x64_sys_getxattr+0x9d/0x100 [ 1392.410574] do_syscall_64+0x1b9/0x820 [ 1392.414495] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1392.419886] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1392.424818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1392.429698] ? trace_hardirqs_on_caller+0x310/0x310 [ 1392.434736] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1392.439779] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1392.444812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1392.449671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.454879] RIP: 0033:0x457569 [ 1392.458077] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.476993] RSP: 002b:00007fe0ce904c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 1392.484724] RAX: ffffffffffffffda RBX: 00007fe0ce904c90 RCX: 0000000000457569 [ 1392.491997] RDX: 00000000200003c0 RSI: 00000000200005c0 RDI: 00000000200001c0 [ 1392.499270] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1392.506545] R10: 00000000000000e1 R11: 0000000000000246 R12: 00007fe0ce9056d4 [ 1392.513820] R13: 00000000004bdd7d R14: 00000000004ce278 R15: 0000000000000004 10:27:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20}, {0x0, @random="fd44a606daf7"}, 0x0, {0x2, 0x4e23, @multicast2}, 'vlan0\x00'}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:24 executing program 4: unshare(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x83d}, 0x28) 10:27:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) [ 1392.638335] FAULT_INJECTION: forcing a failure. [ 1392.638335] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.707464] CPU: 0 PID: 2284 Comm: syz-executor2 Not tainted 4.19.0+ #79 [ 1392.714586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.723950] Call Trace: [ 1392.723979] dump_stack+0x244/0x39d [ 1392.724061] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1392.724115] should_fail.cold.4+0xa/0x17 [ 1392.739569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1392.744684] ? lock_downgrade+0x900/0x900 [ 1392.748837] ? check_preemption_disabled+0x48/0x280 [ 1392.753911] ? find_held_lock+0x36/0x1c0 [ 1392.757986] ? find_held_lock+0x36/0x1c0 [ 1392.762087] ? perf_trace_sched_process_exec+0x860/0x860 [ 1392.767542] ? kasan_check_write+0x14/0x20 [ 1392.771803] __should_failslab+0x124/0x180 [ 1392.776056] should_failslab+0x9/0x14 [ 1392.779897] kmem_cache_alloc+0x2be/0x730 [ 1392.784059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.789608] getname_flags+0xd0/0x5a0 [ 1392.793420] user_path_at_empty+0x2d/0x50 [ 1392.797582] path_getxattr+0xc3/0x1b0 [ 1392.801394] ? getxattr+0x2c0/0x2c0 [ 1392.805021] ? __ia32_sys_read+0xb0/0xb0 [ 1392.809096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.814485] ? trace_hardirqs_off_caller+0x310/0x310 [ 1392.819607] __x64_sys_getxattr+0x9d/0x100 [ 1392.823852] do_syscall_64+0x1b9/0x820 [ 1392.827747] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1392.833129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1392.838065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1392.842915] ? trace_hardirqs_on_caller+0x310/0x310 [ 1392.847954] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1392.852978] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1392.858009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1392.862891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.868084] RIP: 0033:0x457569 [ 1392.871280] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.890293] RSP: 002b:00007f17c2d39c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 1392.898034] RAX: ffffffffffffffda RBX: 00007f17c2d39c90 RCX: 0000000000457569 [ 1392.905335] RDX: 0000000020000480 RSI: 0000000020000280 RDI: 00000000200000c0 [ 1392.912606] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1392.919889] R10: ffffffffffffff84 R11: 0000000000000246 R12: 00007f17c2d3a6d4 [ 1392.927172] R13: 00000000004bdd7d R14: 00000000004ce278 R15: 0000000000000005 10:27:25 executing program 4: unshare(0x8000400) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:25 executing program 0 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) [ 1393.121589] FAULT_INJECTION: forcing a failure. [ 1393.121589] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1393.133453] CPU: 1 PID: 2304 Comm: syz-executor0 Not tainted 4.19.0+ #79 [ 1393.140312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.149676] Call Trace: [ 1393.152293] dump_stack+0x244/0x39d [ 1393.155950] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1393.161221] should_fail.cold.4+0xa/0x17 [ 1393.165312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1393.170427] ? check_preemption_disabled+0x48/0x280 [ 1393.175452] ? debug_smp_processor_id+0x1c/0x20 [ 1393.180129] ? perf_trace_lock_acquire+0x15b/0x800 [ 1393.185072] ? mark_held_locks+0x130/0x130 [ 1393.189309] ? perf_trace_lock+0x7a0/0x7a0 [ 1393.193549] ? find_held_lock+0x36/0x1c0 [ 1393.197620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.203160] ? _parse_integer+0x134/0x180 [ 1393.207314] ? zap_class+0x640/0x640 [ 1393.211034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1393.216578] ? _kstrtoull+0x188/0x250 [ 1393.220386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.225926] ? check_preemption_disabled+0x48/0x280 [ 1393.230950] ? debug_smp_processor_id+0x1c/0x20 [ 1393.235626] ? perf_trace_lock_acquire+0x15b/0x800 [ 1393.240567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.246114] ? should_fail+0x22d/0xd01 [ 1393.250010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1393.255139] __alloc_pages_nodemask+0x34b/0xde0 [ 1393.259826] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 1393.264857] ? find_held_lock+0x36/0x1c0 [ 1393.268951] ? trace_hardirqs_off+0xb8/0x310 [ 1393.273372] cache_grow_begin+0xa5/0x8c0 [ 1393.277438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1393.282988] kmem_cache_alloc+0x66b/0x730 [ 1393.287158] getname_flags+0xd0/0x5a0 [ 1393.290984] user_path_at_empty+0x2d/0x50 [ 1393.295157] path_getxattr+0xc3/0x1b0 [ 1393.298970] ? getxattr+0x2c0/0x2c0 [ 1393.302597] ? __ia32_sys_read+0xb0/0xb0 [ 1393.306669] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.312040] ? trace_hardirqs_off_caller+0x310/0x310 [ 1393.317156] __x64_sys_getxattr+0x9d/0x100 [ 1393.321399] do_syscall_64+0x1b9/0x820 [ 1393.325292] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1393.330666] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1393.335598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1393.340441] ? trace_hardirqs_on_caller+0x310/0x310 [ 1393.345464] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1393.350487] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1393.355514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1393.360384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.365579] RIP: 0033:0x457569 [ 1393.368796] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.387698] RSP: 002b:00007fe0ce904c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 1393.395415] RAX: ffffffffffffffda RBX: 00007fe0ce904c90 RCX: 0000000000457569 [ 1393.402704] RDX: 00000000200003c0 RSI: 00000000200005c0 RDI: 00000000200001c0 [ 1393.410148] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:27:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000db57ce3300000000000000000b000000009c0000656d316e6f646576656d3100000000000000000000000000000000c81e6e050073aafeb75e792e1efe8000000100e1ba000000002c000000000000a60000000000000000000004000000000000002b737973d6803d2efca95a2e3595bd65744a67726f757024636f726f75701500000000000000000000000000bcac031f0d6ba094905d72082cad6103f42470484d1f6f4f8673e05db3c30a13870eefb8f79b6e60"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa3}, 0x28) [ 1393.417424] R10: 00000000000000e1 R11: 0000000000000246 R12: 00007fe0ce9056d4 [ 1393.424692] R13: 00000000004bdd7d R14: 00000000004ce278 R15: 0000000000000004 10:27:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:25 executing program 4: unshare(0x8000400) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x40a}, 0x28) 10:27:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:25 executing program 4: unshare(0x8000400) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd57}, 0x28) 10:27:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x142}, 0x28) 10:27:26 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1, 0x0, 0x2, r1}) 10:27:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security/', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system/sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x103}, 0x28) 10:27:26 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x2, r2}) 10:27:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x812}, 0x28) 10:27:26 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65ff", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:26 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 10:27:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x825}, 0x28) 10:27:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/.use\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:26 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 10:27:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000080), 0x0) 10:27:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65a0", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe64}, 0x28) 10:27:27 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, r2}) 10:27:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev//use\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbf9}, 0x28) 10:27:27 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2}) 10:27:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) close(r0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f00000001c0), 0x400) 10:27:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system/sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdc6}, 0x28) 10:27:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x15f}, 0x28) 10:27:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 4 (fault-call:4 fault-nth:0): unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f00000001c0)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xe80}, 0x28) 10:27:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:28 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4008ae61, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4b2}, 0x28) 10:27:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x75d}, 0x28) 10:27:29 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x5452, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/full\x00', 0x200080, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x3, 0x1, 0x7, 0x7fffffff, 0x0, 0x5ae, 0x4, 0x0, 0x401, 0x47648a12, 0x100, 0x4, 0xdc6, 0x6ab, 0x80000000, 0x7ff, 0x8, 0x6, 0x3, 0x2, 0x6, 0x1, 0x0, 0x6, 0x0, 0x53, 0xab, 0x8, 0x8, 0x7, 0x3, 0x100000000, 0x2, 0x294, 0xd4ea, 0x1, 0x0, 0x1000, 0x0, @perf_config_ext={0x2df, 0x6}, 0x5902, 0x8, 0x8, 0x7, 0x20, 0x69a4, 0x9e27}, r1, 0x3, r2, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vcs\x00', 0x101001, 0x0) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x7) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r5 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x7, 0x3}, &(0x7f00000001c0)=0x90) sendmmsg(r4, &(0x7f00000009c0)=[{{&(0x7f0000000600)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-des3_ede-asm\x00'}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000680)="c81fed541d9e688d04040c835398a321ce9d56b885ca2be4bd932e1222c2bdfce37384b1c14ee8d271aaa5edeb9a5f3a9989cf165cf44a31ab567ace8a938311ac677d9210d80f35080bddcc81bb4428ac8ea022d96d962f938785d9f921b0ed11909a75a2c3dcf73d7e585236e649d5e819a46fac99bf4fbfe946044b3e1c50f9fe5ae1d3dc3453f988a9762aa077d1d93319d60485b364e106d92fc2fceb6eff05f0764e6c38a84f866bfb7d9f4241b31f40f1b0017f00c133dd8ba108f383c04a51829f69f2f33b34", 0xca}], 0x1, &(0x7f00000007c0)=[{0xd0, 0xff, 0xfffffffffffffffd, "a968eff2cb0600db42f12db4f7edf82bf3e63da11553717be0f8d28f9115921a1aec4223b645fd5b602833eaadb25e577f045e78513c2dadf3bf913c721dc2e01a35dd0250295a739be3b8ca60e53f63b59d6829ff62349b9bbb0b8ca41c93185ad12e57a90df905ffcf2ae6421f89a1ac349f7beb17d7b3f26132db5df0c49c1a488f1acc857856b289f85672cf63dad0a6a68f3eb963146d1c0459b8e3b3f44fa23b36b6cc6505485660906c6678bab337a4e514870ae015"}, {0x40, 0x12b, 0x1, "89da619953a0418c6c3957388199c7dc77b7f47d1e12eaa18068016214d9050baafc99129757167e7504a0ff"}, {0xe0, 0x1, 0x3, "05a7b8e5e258fc408aad0b66b9edc1265c25c46e88d8f5908a63eaa812d1e8b4b189a65478901895bae09776097c86929b6c8f8d9e421af474940f1fac5ada5c2e4fe63f8e754d854e60593bce054e6311068085c0a1e09756f812573a1d4c988c6658e32f112624e6c89b03588b4e0f0d733a36927d6525632a93e4e1652289a3017484685a66b097a5ef7fa27b124f87f9fc5851a01f54126d65299a2550dfb1dc3cfb489763d5b8b1007760f8e1a0b61b06cb8565fa482921502ba09fd12577ed60b1aa650ab27270a80a"}], 0x1f0, 0x8004}, 0xfffffffffffffffd}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000240)={r6, 0x20}, &(0x7f00000002c0)=0x8) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r5, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYRESHEX=r3], &(0x7f0000000a40), 0x0) 10:27:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365ff"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x761}, 0x28) 10:27:29 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc020660b, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d6502", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6ec}, 0x28) 10:27:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:29 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4008ae6a, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f6675736502"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x856}, 0x28) 10:27:29 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x5451, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x6, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f00000001c0), 0x0) 10:27:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65ff", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:30 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x80086601, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x25c}, 0x28) 10:27:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365f6"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa16}, 0x28) 10:27:30 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4b47, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd72}, 0x28) 10:27:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0xfffffffffffffd95) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65ff", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x6b6}, 0x28) 10:27:31 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020940d, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd5f}, 0x28) 10:27:31 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x5460, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0xfffffffffffffe94, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000100a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65fe", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x5421, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65f6", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x625}, 0x28) 10:27:31 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020aea5, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x5b4}, 0x28) 10:27:32 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x40087602, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000240), &(0x7f00000002c0)=0x4) read$FUSE(r0, &(0x7f00000040c0), 0x126a) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000003c0)={0x103ff, 0x0, &(0x7f0000ffc000/0x1000)=nil}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x772}, 0x28) 10:27:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d65ff", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:32 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4010ae67, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known="73797374656d2e736f636b70726f746f6e616d658c", &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:32 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4b49, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd0}, 0x28) 10:27:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:33 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x40086602, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9db}, 0x28) 10:27:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6664000000000000003f000075f2616226825bf88c41d60ecc465136a5a8f25f9a8aa3ba4350fc741a3023e940262057182c1ffd8b57f6dc2184fad643ee08c86309d8c25e15906ffbbd31831e27cffcafdae00362c41d3e240040f8eb9c4a186c38d9ea54f0aed30a5c", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000005000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a6734b77570000000000000000000000600000000000000000000faf0f47a6997221c1e965b0afd8015cb9f2b723b4128ac67002e316746b83e3d030c62f34ab9ef6941ed4c459515f5c8b9ecd7bd98a9e22a94f7cb80095b7c59a51027813111a62e2e4112a7e4e0"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[], &(0x7f0000000080), 0x1000) 10:27:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365ff"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:33 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x5450, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x66f}, 0x28) 10:27:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:33 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae46, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x306}, 0x28) 10:27:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6465303030303034303030302c757365725f69643d0000060000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=""/90, 0x5a) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xae03, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365ff"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)={&(0x7f00000005c0)='./file0/file0\x00'}, 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000009040)=ANY=[@ANYBLOB="dea8454e026e9a87a4902b257c6adb3a66643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x391240) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000008b80)={0x0, 0x0, 0x4, 0x0, [], [{0xcb6, 0x0, 0x4, 0x2, 0x9184, 0x1ff}, {0x6, 0x1e, 0x7fffffff, 0x1, 0x1000, 0x7}], [[], [], [], []]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20}}, 0x101, 0x80}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r2, 0x6, 0x5}, 0xc) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000009100)={r2, @in={{0x2, 0x3, @multicast1}}, [0x5, 0x2, 0xc2b0, 0xca, 0x6, 0x3, 0x9, 0x0, 0xff, 0x7, 0x9, 0x80000000, 0x9, 0x3, 0x9]}, &(0x7f0000000400)=0x100) read$FUSE(r1, &(0x7f00000030c0), 0xfffffff9) read$FUSE(r1, &(0x7f0000000680), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) sendmmsg(r1, &(0x7f0000008f00)=[{{&(0x7f0000001680)=@rc={0x1f, {0x7, 0x3, 0x6, 0x200, 0x40, 0xfff}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000001700)="cc5706ada9faff61eb8e7e5e2c5ece361d65b10e3d9ddeb2b8303f0c084616ced2196c72808cfde48c6dc5339230456778bb806c1eb74d5809eb70401de2ec809fcd3f1102b2d01489916d4d459af85a6d8919e64411f3428b3ac715053b5d6543c1ff9e0c2de85feb91f3c29495d95befd4d77ec6e2406e88e2409570adda6d12346d0d22e895f33e3d8b7b4cf17b", 0x8f}, {&(0x7f00000017c0)="ed455e3ca0e34074f7c65139c4e5597301cc342a517ef61ce079edef4ed58af7ff31659b29e69dc53035788730b8d1c8bc06f84c4c97bd059a3d54862af91857100af9929e4a4a7073022c730a4157903c5c131f902178e15646c01b70ca840647b5b01b9bab9161249c2e39e6bf93887f2861197863342838cd840a8aedbd82ecbdc2bcd4f68ee57f72d995f6f0523bfc0c193a1df37e575cb2484a6ec336d3489dd9c7443b2190792827dde934d1b9a9cdb2b3cc4321c3d747fdb58bce", 0xbe}], 0x2, 0x0, 0x0, 0x20004800}, 0x80000000}, {{&(0x7f00000018c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x1, 0x7, 0xa71, "2a32af89fce98ed5f7e326e1ab04ea5e18cb9b0df5a80c6dad0dbc135c0e9eaf997d9f267c29d44b94dcb3983e5e83cc6d4c348ad446e73bb9facd2de2675e", 0x38}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001940)="13a4526545e396c39fc7e8fea716ec7142852ac19bacf2", 0x17}], 0x1, &(0x7f00000019c0)=[{0x80, 0x0, 0x3, "d74f28a5398ec56cd33791d75abbaeb25b789191df16ffccca8447913d75808c7c0c3b32e50544e60c2832322abd1e4390619d93bcc6cbe8fdf0c4a5dd038a7c2cf0b9fbe9a9d377ad216d13e369286aac44d07027ebc04ef32ad71d55e73340ed91fc7d6a1986f851914457"}], 0x80, 0x24048010}, 0x401}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001a40)="d2fa42ac70f39dfcd344c7cc6824a12b7fdf8137619bb2073c6348e9fde106d4ff1514c512614bd22a701b7d6b227e3a7abbf2a7b46dca98b795de8e936808639c", 0x41}, {&(0x7f0000001ac0)="10fe8220836a7a791ceac0d8dbfe4e8fa688d23b368e18", 0x17}, {&(0x7f0000001b00)="cc91a3390a605c4ac2c38420c73bfa3821d34f1b13d97a3ef6ab5f87e467627fec66e1bee7c88f6c", 0x28}, {&(0x7f0000001b40)="ce749629ce1ec21907b25c210d1cce5aec144d845f2e57104b7854fa3c1959f97c78d9c8a4f9387f42996d36214a8a3bc817d52face80430c9f75c07321c361a5f9d9cbd1231dd3ff093931eecf11a2b1fd88648f061d14c87ef88daea6ba6d510955a65f431a5a3", 0x68}, {&(0x7f0000001bc0)="dc7e", 0x2}, {&(0x7f0000001c00)="6ea42bda87fbdf5a5f6663ea8e00040047", 0x11}, {&(0x7f0000001c40)="6059029d85428c1b332a7144711e8f11a44531a5a7065e21966c6bb00915fcb64103caac4712c950e10c7e963501278cb890addc0f8a695354f76663e4230681a4fbf59d02bbbee2f4655467c3d6ba8edaa56cc7e31982c9f244c866683ea106beb6a189865fec0b613521dc4fbcd430a2458f805cd7263688dca544dd270ae48b5438fabd717f06edef9a68b403ff6a70b55a7b13d5e03f896c2c1f8181cd9134c2d2f1c2cd550489542cfd4ce2bdbc5f6798ff6841418323938d0f6689b3822296e09abe937ed28f991e768637edc4624bc0a3acc3cb24f546adc9dd7a5117dad078d11851", 0xe6}, {&(0x7f0000001d40)="28e126628da29598d936ea89f234340ea9bff855fe05c86d44c2ab435d56288f6c038e7d73b5fce24a02d5153263fa2f17949aaf1e635f81cb31f2f39b31353eec549ff1f6a6f833ab1c50a498a40da806bd60053a929586937d3aaa0327171d5831116bad8fe22be5cef0", 0x6b}], 0x8, &(0x7f0000001e40), 0x0, 0x10}, 0x2}, {{&(0x7f0000001e80)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e23, @multicast2}, 0x3, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000006340)=[{&(0x7f0000001f00)="94d5827d880e7205e22e1fea2a499158c9a37c6811c5a2bb388a56f55ec6660cfc232aa0c74dd84cc587dcf6dd32b6b41341bb8079cef315f4ceeb336f89779f818622eaa08901edeb1c61bbe32465c85609e5d840c3a19ade2bffb14631e0c3496d4cb0e8c4215d9e3b56468ed0597984f729557f99e587102a2eb2b171748ba29f658944c686632c1930c72dbf8af269a8504fec4a43b373", 0x99}, {&(0x7f0000001fc0)="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", 0x1000}, {&(0x7f0000002fc0)="ea0b2cee513f8855d6574c5ba3fd77eea7444c1672d515db6672a865cc0989b8af61d70fbf0a1a9816a719b0f02ae3510755cf673a63fa6769215f369143", 0x3e}, {&(0x7f0000003000)="0320c1d23d15432e06d1d508a654948f8506a2626ff15b03c57da245566c84ceca5ee3f07b1d191a9c28852b502b04b7b8e0d16c32fcdb1cff4f623ef600bd77562c227c19f2", 0x46}, {&(0x7f0000003080)="b1ab4a40a6f06368be5fb81d39727d4b6e56f74e94ba13a0f8ad94ad52adf17996778b293bf8858d8d7cf523a7483c377cace629d5f2f988154973c30d25d8", 0x3f}, {&(0x7f00000050c0)="82e735d1efdb902df1b6dd252e28f65f72c75520421cd9672bc9a3fceb6d4e50832c6380f3a3bc3b41b7573f0761f019dcdd935b9844f5b39d3a967f1a0423a6862fbe1cfa442202382fb7e4ac1c602380de40fd0219c418ac2d5a3143ed67386cdb98284b2b3312b090a4a1dada87ee678d8a7c40c134bebcc0", 0x7a}, {&(0x7f0000005140)="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", 0x1000}, {&(0x7f0000006140)="b218cb6a4d5c2cd526e82ecef7933c0171fd06938b0eb901dfeb02b940ad28b7f4b56906c70f0e3d00be198d5abe79c9993a94cc8cf328df4763ca79c512770af42560f1baff3271b9e574ef48e35100c66a7d618bf1ed3b0b472bb14187593347590208080d934bb34221fecb7e7de3537d04724bc5a431f10b3a56833578ed99e8ede496", 0x85}, {&(0x7f0000006200)}, {&(0x7f0000006240)="6f0889f5bb8f346d8d49b115268db81dad7f10acac0c91e043f2abf4cdb3c8fec9d4b167e414965ddb5a8be97016667f7c08e5843991cb1b1c855ed80c281aedec024602bda0efe284e7fedad966fcada37e06a6834b70f1db6e5b389cefa785fc00a6bfe50857bd7dc4aef79f7793138c3babb9ba26ec707648258c5209ad93a74747c618788b982aadd1e691f8f616e845e022827215f8a01075ea0f8ac8a143d8266108f7ecaded54df4fe2a6629d88adcda018c0b1ef71f4af7a5aa412e76e2e7b34442ee75b88eda57e776e8ab430c4dc51fea687f658723fa2891f0ee4f24cedeba86a34d74919ffc960865362267e16719b1ebda431da", 0xfa}], 0xa, &(0x7f0000006400)=[{0xa8, 0x189, 0x4, "6ccd00d6cdf4b7c701db9b6703dfc03e1a4d5b3beb844e5917dc0ff743435e0f329b38c7ced16caba52f865d531dbc3f32226a34774142f5a6f8db57b1af98d86ff371e33df2092c6d298c8058af19690296081a7298a4b4268dfedc8d3435745e25c53086fe3d4387fe38926ceb07af6c809ac82728ddf4759b0374db0676a311b18d3eb70f27e43e48a1f553f67f1b6e6e2d148f5e"}, {0x20, 0x104, 0x8001, "7ecca36fc65dfe798da163ea"}, {0x1010, 0x105, 0x5, "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"}, {0x30, 0x11f, 0x7, "e0cb2effe0e71461eaae282f8e4287bb1069c12ada67b790357cd14ffdfbb3df"}, {0xc8, 0x103, 0x101, "5502cea24695db0cf2cb989c35e20d6fe8e1bf17e37b5e1c72642e1cdb714930c1c2f6bc2e1f3dc6e64fd8a98fe0ad4fbe83f816bbc12c97bf2ab9973f6569e97254c812082c175bac11fda8ea5d849bcfac120012b701e9b1815268361c8241e3988f4fd334ada1bdfd6d565985089ec359909d5f76eb8807c25320b96a400e74419139a90c9352565045455d2f7b828fa646945bda7445119eebaeb2acc9dfa003faf2ed61c95353d99fe7f4e1a50f4c0eb6c3"}, {0x70, 0x10f, 0xfffffffffffffdd9, "e0d0b5a55278b11938bb7f74dca3c7ad46f0f7acd39e40f217d30689823e29bf50e25c65c9dc2e5e56693fefab371fb69453cf31ac83ae6cba2e77e0104702a0dffbefaa3b098547bd4e81aadba7e5f44a236f4cd3d922b146f8e780"}, {0xf8, 0x105, 0x0, "fab312bcd95ec70130848105be1128c0ab8690d68d720efa9124be116edcd9cbde84aa7ca1c7f199fa89bbd64b16b20fac28db739c65148f1a87633927ea9726116d7e8d1295d3d3966f1109b063c9c1cc2fd581b4d1ab2e9b2dd480da8467ca55faa8c27967ae30e2bc07d9faff91c0f3f9d66227309c7e4308e77bfaf993869c5a957383595b3d73ce8ad9863e58656d9585953e76d64a260b10365aed51670b500f5c1ab20b842d4bd77dc833c77fd884d368a8f317909570d4be8b9a0f8b231d17955a2431cefde490bee9257e35b6caa362eced62733fe7b7a4607811d08304d2aa"}, {0x1010, 0x101, 0x9, "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"}, {0x40, 0x105, 0x9, "0f48317be9f1f9989bce59f6f834c4a42eed6848f055f189b801346d7ccae2ebf7cf9afb4b7bdd5e7334089cf2e15a7f"}, {0xe8, 0x10b, 0x9, "baf6206d127483cc321d2df6bf867df74ed9d6f19e549dbfdbf71f0a4a7494574e3314b452a380e2c3e7992607218255db3dd6dd3e06f209dae16fb0710d83fcb33d1c908aec2ed4a41ebc6953a65c899e8a6a80d89fe1e04c137a32e94bd31c6202b09c2abd2268027000f9d18847f1db2d6fda6db3b06b0f10202e7e0cbf2a2c20228ed3845240552fc0cb508d601a63976fb3507f6776609a07edffe41649147d8300052ac5a0052909fd54d334061708bba2e810701e66cc7802856506e30ee46cd2515eeb72636ffe942e85887432ea"}], 0x2470, 0x1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000008b40)=[{&(0x7f0000008880)="c2e1aa834b603e8708ccf509344d6fe306469c0da05e79ef7b019d01ccb6b2c494db5e5b6e0f9fbc7893fcc8426a748cec19e6f9f21d97d2c4aaaa38ad6b528d847f8a4d73d657a3d3d5e2d31ff3cf7c06412ecf045f4cedd9b5e1e0de189ee5c879b6ceb7fc78df3a4c7ba489e61fd172ce8856a3587bac5399d6c320fd744542e49fdfad98925d1cd8a7e79977293dbb5ad145edad6d98c36d57e2910fddb41c7c9d104eb2ea6922a08a3a11e8cb687ef7212cb86b6cee2205b1799aca1aaef22b90744273c191427d3cdd385788284965fef340f235a895cee5546d33f7b381", 0xe1}, {&(0x7f0000008980)="4da40aa639452fd24a4ae8e7ed207c7e368532c233dde0a1c7be29609771c2a037e0c1b2b0c845a4a2d7f3a52618067c2ff22eeb2f9b29e288b9ad95223a3345bf6d6fd7a6c22d5e7ca4a3c22169f7472034e20081fb55db7501dc4e96b48fb92a0165c84eae9ca4d0493aab837cb44ef1a2c4c0ecc32bd35dd8f403e9830c10bbfb2ee7e82531be3e524da682ba5a114ed3e181e0d10dbcb35ca115f2dfe0fdd9708a99da49595d41184c4e1c3383f47d6c738a7c27221c7cf0c55c516fad74c6d0705531e9757964e7ea1b8afabba402578dccd8d31197be0e9c08850e820e5b8d0f8aaa8c5857d52368a5", 0xec}, {&(0x7f0000008a80)="305523c0", 0x4}, {&(0x7f0000008ac0)="6787b154b98bd9e690bc16a8f5a6a98ea06d9c5f0f24235c098d9cb9b41bc667c33b927477080a7cf400d076da6282ff2e6d01e122c0d04bc14207ae405cba9ec729bbebeb7128261e3141cff757f52cf0fc168fd0b551c42243b5ded43b50a947926560b2872ef3ba5532939751fe1629da63ea33", 0x75}], 0x4, &(0x7f0000009200)=ANY=[@ANYBLOB="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"], 0x380, 0x8000}, 0xf2e}], 0x5, 0x4000000) 10:27:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc0045878, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x827}, 0x28) 10:27:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69e43d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200001, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 10:27:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xd93}, 0x28) 10:27:34 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x2, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotonamek', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x74b}, 0x28) 10:27:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) mount$fuse(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x4, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@pcr={'pcr', 0x3d, 0x14}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_lt={'fowner<', r1}}, {@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_lt={'fowner<', r1}}]}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:34 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc0189436, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="001c40", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000) write$tun(r1, &(0x7f0000000600)={@val={0x0, 0x21f}, @val={0x2, 0x84, 0xc27, 0xcf, 0x9, 0x3}, @x25={0x3, 0x2, 0x37, "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"}}, 0x1011) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:35 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc00caee0, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9ea}, 0x28) 10:27:35 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc008ae67, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x300}, 0x28) 10:27:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9e3}, 0x28) 10:27:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:35 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x40049409, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x20e, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x2, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x3ea}, 0x28) 10:27:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f0000000600), 0xac) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="90000000000000000200000000ddffffffffffffff08000b0000000000a59f45127c1a2e0000656d316e6f646576656d31f3ffffffffffffff00000000000000b6b5a0e46fddada938a63b00000001000000000000002c000000000000000000000035a600000000000000e8ffff0b000000000000002b737900000000cc637075733595b965746367726f7530246327726f7570d700005de379c9018f2e84cda9d3d9ab08c665b8"], 0x90) 10:27:36 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4040ae79, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:36 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4010ae68, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x732}, 0x28) 10:27:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:36 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4010ae42, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:37 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000001c0)='./file0\x00', r0, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f00000040c0), 0x126a) read$FUSE(r2, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000280)='./file0\x00', 0x800, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="edff2869ace637d5"], &(0x7f0000000080), 0x0) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000240)) 10:27:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x348}, 0x28) 10:27:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:37 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x80087601, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0xffffffffffffff20) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x90) 10:27:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9e7}, 0x28) 10:27:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:37 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xc0045878, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xa26}, 0x28) 10:27:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:37 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x541b, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'group_id'}}, {@measure='measure'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x200102, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x16}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000400)={r2, 0x7f, 0x10000, 0x4}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r3 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000badfee6633001d33b952bcc68618ffd292729ba2cdd2689e27368153df4443811094e53ac4c2f262b7842d5afc878919a79f91b05a93c847b59622d87ea040f2de929a571893be29d0727d851a1c5b"], 0x8a) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000440)=0x9, 0x4) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x1b7}, 0x28) 10:27:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:40 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0xae41, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 10:27:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="000000b04148d253d72f621fba80b3cd056f69e5ad31162d03ed76a6ec51ac60c95b4790b7ae329b13963bc1e3457476dc1a2edfb0a779c6ec5df1aebbd8d2855c0dbdfaacdec5cc5a1fe1996424ca43a060bd814fe7a947525a871de0083d084f62d660d6430e1d9b2f48fe09819d8fe82c750d522dd5915416da86660f8b7ac058bf", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR, @ANYBLOB="a1cdcab7e7268bcb5e263efc3b26002eb6df471f157617c631c9dba9b312854190f14d10e984993ea8e0392bf3267ef04e0007d5274ed09e90e7563f3751f5b29b2d96f06a1eb9a418bce235757f0c18db866a4ae5a6ae51e7b9e85ef77cc9c8229b0a6b15e1f5f4ce50fe1b2bc626db0752085eef4b6a3ac6c926fb17bd3171434fbf2a58698fc1ff8c4b3a7bc3c473b610cc046287d2", @ANYPTR], @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESDEC=r0]], @ANYBLOB="0100"]) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0xfb7) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0xe0000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000380)={0x0, 0x7}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0600015ccc1a"], 0xa) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) syz_mount_image$ceph(&(0x7f0000000480)='ceph\x00', &(0x7f00000004c0)='./file0/file0\x00', 0x6, 0x6, &(0x7f0000000b00)=[{&(0x7f0000000700)="622e1d30b775fb2dfb64b7c549c920c412f69b558389d1c94d14dc8a183e8b8812c360a36f81b4e436b4862b28a690eb98fbba3cb9053b4829a364a1c81b705e04f0947311b5ab5c87fb5c57e48ca421eadcb5671c33b4710fae1a6c368e4f0bbfec52e7c145a45c9f9cdd0b61a4273fbd11cffeaeab883ecb48f358324b8b7064e7c562bbc587566aea1706e5ab3cd3f290a22430311f9243ea5785cdf17feec9b9ad6dcf0d4633f88350d715723b8efa99050963980949474978a418e207333e81be3dec96d4a557e4ea2120", 0xcd, 0x7fffffff}, {&(0x7f0000000800)="61e6bf", 0x3, 0x6}, {&(0x7f0000000840)="668e1e4b63b0946e8c6a7af6d45c60fd0f7c45d2d96dca60fcedeb2880c8063e62e05edcc0c90a362f786279c130e2358ff9da8add5dd72ee97068ed877575f26164bf54d7cebd8f408423732ce5084270384e2c0296c0b11f5db4b4e207edb0000f12806e83e0e5fc3b29a631ba6880488989d21bf1efd650ad7a4da6e4937a4939ad54f7048af3a961a4cd0764254075dea5f6ff7e28d9d21ea9f6e7e70e712564c021e66793e6364811bb7bcd56f78546ddba310bc4a2813111f20e38b39bc33efaddebfa581baa001cc9c91c", 0xce, 0x80000001}, {&(0x7f0000000940)="80aebb48c48d253e40f0816b75dee28fc33e27647dac0bd91e38fe8c427c70ade78cfbaadbdd41b232b062c50cf89b184950cf2fbdf62c8e9c208ccd74e3640c042828bd09eceee01de8ea002e34a9ee277baf571156e280", 0x58, 0x88}, {&(0x7f00000009c0)="016e008afc7494bb5edb978d051ad58d8c2b3dad9117d4b4aed66799a5373d8cdaed5a76538c659c5bcd0569c98c0159856c5815ab95ee0db71db91cca52e4cc33183ddce1a587cbaf65b94148161fea3a0872c416c6a8a571e48e30ddc8cdd70885ebbc0b92ed3703d6811578b4625e8d594ad29c78d3a76cdfa0792622afbd8a9ae9dad6eb2c5ae719b9ee6fdc684b9ede88", 0x93}, {&(0x7f0000000a80)="a517109f6b67c9c46d535819287096981a0ab411b8f81d8cc7a968b465fc52bf80192066205a0b318096c9387b3e05fe61470804c718d2a30290861914a4c35387f53e172d5c33a855fdae751a5855cdfa9c82299704887800d27b287cdab7eef363c73ef23571f4536ff45e16bfadad1fbedea645ab78ec90", 0x79, 0xd84c}], 0x104988c, &(0x7f0000000bc0)='fuse\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)=0x0) syz_open_procfs$namespace(r3, &(0x7f00000002c0)='ns/mnt\x00') 10:27:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:40 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x85) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0000006012e16781b34d56a31d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0072f09633d85d50721f19601f608b9e3c67f8daaa46c0d03d8df8ba686d5c2263d1455601315dd672007acd7c4fbe3af09c2f8c8ed2a622c76d62c9d7a19efbf4dd52a9"]) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x21a143, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000080)={0x6, 0x8, 0x5, 0x0, 0xd}) r3 = getuid() ioprio_get$uid(0x3, r3) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="9000f7ffffff00000200000000000000000000000000000b00fe0dc4db16c589000000000000656d316e6f646576656d310000000000000000000000000001000000000000002c000000000000000000004435a6000000000000000000000c0000000000cc637075733595bd65746367726f7570246367726f757015000000000000"], 0x90) write$FUSE_IOCTL(r2, &(0x7f00000002c0)={0x20, 0x0, 0x2, {0xa921, 0x0, 0x9, 0x4}}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x1, 0x2, 0x460, 0x298d, r4}) 10:27:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7ff, 0x1) ioctl$RTC_AIE_OFF(r1, 0x7002) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="84000000000000000200000000000000000000000000000afff60000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a60000e2ff0000000000000c000000000000002b73797374656d9db234ec0049eec16cdd42f581cc637075733595bd82746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:40 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x3f000000, 0x2, r2}) 10:27:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x20000, 0x4000000000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x748}, 0x28) 10:27:40 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xffffffffa0018000, 0x2, r2}) 10:27:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365a0"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xc6a}, 0x28) 10:27:40 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xffff8000, 0x2, r2}) 10:27:40 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xfdfdffff00000000, 0x2, r2}) 10:27:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x864}, 0x28) 10:27:41 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xa0018000, 0x2, r2}) 10:27:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x278}, 0x28) 10:27:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000005c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) 10:27:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', "2f6465762f66757365ff"}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xbcc}, 0x28) 10:27:41 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xfffffdfd, 0x2, r2}) 10:27:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000000000004000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) read$FUSE(r0, &(0x7f00000040c0), 0xfffffd8e) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x8000, 0x9, 0x5, 0x0, 0x0, [{r0, 0x0, 0x4}, {r0, 0x0, 0x100000000}, {r0, 0x0, 0x9}, {r0, 0x0, 0x16ac}, {r0, 0x0, 0x6}]}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0xe1) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xffffffffa0010000, 0x2, r2}) 10:27:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x4e0}, 0x28) 10:27:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101000, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x9, 0x80) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000004c0)={'bcsh0\x00', {0x2, 0x4e23, @remote}}) r3 = request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000480)='/dev/dsp#\x00', 0xfffffffffffffffb) keyctl$read(0xb, r3, &(0x7f0000000600)=""/166, 0xa6) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000006c0)) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000280)={0x3, r2}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=@known='system.sockprotoname\x00', &(0x7f00000003c0)=""/52, 0x34) sendfile(r2, r2, &(0x7f0000000700), 0xb3) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000002c0)={'veth1_to_team\x00', {0x2, 0x4e24, @remote}}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000740)='/dev/rfkill\x00', 0x8000, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000016c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646c76656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x200000) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000080)=""/112) pivot_root(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') 10:27:42 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xa0010000, 0x2, r2}) 10:27:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="150049c9fe3d52d62a066003dc26342c57a15f3766e3fd03573135340e4b096fe252b7d98cb8056108b3a9063e05042641c025a640a6450da3ff6453afca221e878247a46200ac54ccc66e4bd0"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000001c0)=0x2) 10:27:42 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '/dev/fuse\x00'}, &(0x7f00000002c0)=""/52, 0x34) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b000000000000eb656d316e6fc4878e80d65f50bad10e21646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075732295bd65746367726f7570246367726f7570150000"], 0x90) 10:27:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0xdac}, 0x28) 10:27:42 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x1a0, 0x2, r2}) 10:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) 10:27:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x8a, &(0x7f0000000000)="de009b8db770076a6337ccd9e871", &(0x7f0000000440)=""/138, 0x9dc}, 0x28) 10:27:42 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x80ffff, 0x2, r2}) 10:27:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000040c0), 0x126a) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65744a67726f7570246367726f75701500000000000000000000000000"], 0x8a) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0700000000000001"], &(0x7f0000000080), 0x0) read$FUSE(r0, &(0x7f00000005c0), 0x1000) 10:27:42 executing program 4: unshare(0x8000400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x1a0ffffffff, 0x2, r2}) 10:27:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@random={'security.', '/dev/fuse\x00'}, &(0x7f0000000480)=""/52, 0xffffffffffffff84) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000000000000000b00000000000000656d316e6f646576656d3100000000000000000000000000000000000001000000000000002c000000000000000000000035a6000000000000000000000c000000000000002b73797374656dcc637075733595bd65746367726f7570246367726f75701500000000000000000000000000"], 0x90) [ 1562.835666] INFO: task syz-executor0:5519 blocked for more than 140 seconds. [ 1562.842943] Not tainted 4.19.0+ #79 [ 1562.847174] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1562.855215] syz-executor0 D18360 5519 1 0x00000004 [ 1562.860923] Call Trace: [ 1562.863538] __schedule+0x8cf/0x21d0 [ 1562.867351] ? perf_trace_lock_acquire+0x15b/0x800 [ 1562.872298] ? debug_smp_processor_id+0x1c/0x20 [ 1562.877044] ? __sched_text_start+0x8/0x8 [ 1562.881196] ? perf_trace_lock+0x7a0/0x7a0 [ 1562.885415] ? perf_trace_lock+0x7a0/0x7a0 [ 1562.889711] ? zap_class+0x640/0x640 [ 1562.893429] ? zap_class+0x640/0x640 [ 1562.897209] ? zap_class+0x640/0x640 [ 1562.900928] ? mark_held_locks+0x130/0x130 [ 1562.905156] ? find_held_lock+0x36/0x1c0 [ 1562.909319] schedule+0xfe/0x460 [ 1562.912695] ? __mutex_lock+0xafa/0x16f0 [ 1562.916845] ? __schedule+0x21d0/0x21d0 [ 1562.920836] ? kasan_check_read+0x11/0x20 [ 1562.924970] ? do_raw_spin_unlock+0xa7/0x330 [ 1562.929455] ? do_raw_spin_trylock+0x270/0x270 [ 1562.934053] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 1562.939557] ? mutex_destroy+0x200/0x200 [ 1562.943630] schedule_preempt_disabled+0x13/0x20 [ 1562.948449] __mutex_lock+0xaff/0x16f0 [ 1562.952356] ? d_alloc+0x28b/0x380 [ 1562.955967] ? fuse_lock_inode+0xba/0xf0 [ 1562.960047] ? mutex_trylock+0x2b0/0x2b0 [ 1562.964101] ? d_alloc_parallel+0x8e8/0x1f40 [ 1562.968580] ? lock_downgrade+0x900/0x900 [ 1562.972749] ? check_preemption_disabled+0x48/0x280 [ 1562.977853] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1562.982791] ? kasan_check_read+0x11/0x20 [ 1562.986994] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1562.992345] ? rcu_softirq_qs+0x20/0x20 [ 1562.996388] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.001522] ? d_alloc_parallel+0xb7c/0x1f40 [ 1563.006012] ? mark_held_locks+0x130/0x130 [ 1563.010271] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1563.014410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.020010] ? check_preemption_disabled+0x48/0x280 [ 1563.025052] ? debug_smp_processor_id+0x1c/0x20 [ 1563.029790] ? perf_trace_lock_acquire+0x15b/0x800 [ 1563.034747] mutex_lock_nested+0x16/0x20 [ 1563.038921] ? mutex_lock_nested+0x16/0x20 [ 1563.043169] fuse_lock_inode+0xba/0xf0 [ 1563.047135] fuse_lookup+0x8f/0x4c0 [ 1563.050773] ? fuse_lookup_name+0x830/0x830 [ 1563.055084] ? __lockdep_init_map+0x105/0x590 [ 1563.059650] ? __lockdep_init_map+0x105/0x590 [ 1563.064156] ? lockdep_init_map+0x9/0x10 [ 1563.068290] ? __init_waitqueue_head+0x9e/0x150 [ 1563.072969] ? init_wait_entry+0x1c0/0x1c0 [ 1563.077372] ? lock_acquire+0x1ed/0x520 [ 1563.081368] __lookup_slow+0x2b5/0x540 [ 1563.085241] ? vfs_unlink+0x510/0x510 [ 1563.089127] ? path_init+0x1ed0/0x1ed0 [ 1563.093042] lookup_slow+0x57/0x80 [ 1563.096668] walk_component+0x92b/0x2590 [ 1563.100742] ? trace_hardirqs_on+0xbd/0x310 [ 1563.105051] ? path_init+0x1538/0x1ed0 [ 1563.108990] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.114110] ? pick_link+0xaf0/0xaf0 [ 1563.117935] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.123035] ? set_root+0x42b/0x810 [ 1563.126735] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1563.132384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.137993] ? selinux_inode_permission+0xb7/0x750 [ 1563.142942] ? selinux_capable+0x40/0x40 [ 1563.147080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.152112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.157705] ? security_inode_permission+0xd2/0x100 [ 1563.162741] ? inode_permission+0xb2/0x560 [ 1563.167045] link_path_walk.part.40+0xa61/0x1530 [ 1563.171823] ? lookup_open+0x1b90/0x1b90 [ 1563.175976] ? walk_component+0x2590/0x2590 [ 1563.180310] ? find_held_lock+0x36/0x1c0 [ 1563.184360] ? check_preemption_disabled+0x48/0x280 [ 1563.189445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.194989] ? percpu_counter_add_batch+0x141/0x190 [ 1563.200083] path_openat+0x270/0x5150 [ 1563.203900] ? perf_trace_lock+0x7a0/0x7a0 [ 1563.208194] ? zap_class+0x640/0x640 [ 1563.211923] ? path_lookupat.isra.43+0xc00/0xc00 [ 1563.216742] ? unwind_get_return_address+0x61/0xa0 [ 1563.221676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.226752] ? expand_files.part.8+0x571/0x9a0 [ 1563.231407] ? find_held_lock+0x36/0x1c0 [ 1563.235470] ? __alloc_fd+0x347/0x6e0 [ 1563.239401] ? lock_downgrade+0x900/0x900 [ 1563.243564] ? kasan_check_read+0x11/0x20 [ 1563.247769] ? do_raw_spin_unlock+0xa7/0x330 [ 1563.252187] ? do_raw_spin_trylock+0x270/0x270 [ 1563.256836] ? __lock_is_held+0xb5/0x140 [ 1563.260909] ? __check_object_size+0xb1/0x782 [ 1563.265398] ? _raw_spin_unlock+0x2c/0x50 [ 1563.269599] ? __alloc_fd+0x347/0x6e0 [ 1563.273419] do_filp_open+0x255/0x380 [ 1563.277280] ? may_open_dev+0x100/0x100 [ 1563.281277] ? get_unused_fd_flags+0x122/0x1a0 [ 1563.285910] ? __alloc_fd+0x6e0/0x6e0 [ 1563.289868] do_sys_open+0x568/0x700 [ 1563.293575] ? filp_open+0x80/0x80 [ 1563.297186] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.302304] __x64_sys_open+0x7e/0xc0 [ 1563.306170] do_syscall_64+0x1b9/0x820 [ 1563.310080] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1563.315437] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1563.320449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1563.325300] ? trace_hardirqs_on_caller+0x310/0x310 [ 1563.330465] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1563.335504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1563.340423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1563.345672] RIP: 0033:0x455570 [ 1563.348873] Code: Bad RIP value. [ 1563.352222] RSP: 002b:00007fff8b7a9c20 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 1563.359989] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455570 [ 1563.367304] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004bc2ae [ 1563.374563] RBP: 0000000000002613 R08: 0000000000000001 R09: 0000000000ece940 [ 1563.381897] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000015 [ 1563.389208] R13: 0000000000158375 R14: 0000000000000981 R15: 0000000000000000 [ 1563.396876] INFO: task syz-executor0:3337 blocked for more than 140 seconds. [ 1563.404058] Not tainted 4.19.0+ #79 [ 1563.408250] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1563.416259] syz-executor0 D22904 3337 5519 0x00000004 [ 1563.421878] Call Trace: [ 1563.424454] __schedule+0x8cf/0x21d0 [ 1563.428229] ? __sched_text_start+0x8/0x8 [ 1563.432394] ? zap_class+0x640/0x640 [ 1563.436160] ? find_held_lock+0x36/0x1c0 [ 1563.440232] ? mark_held_locks+0xc7/0x130 [ 1563.444378] schedule+0xfe/0x460 [ 1563.447887] ? lock_downgrade+0x900/0x900 [ 1563.452054] ? __schedule+0x21d0/0x21d0 [ 1563.456095] ? kasan_check_read+0x11/0x20 [ 1563.460257] ? do_raw_spin_unlock+0xa7/0x330 [ 1563.464724] ? do_raw_spin_trylock+0x270/0x270 [ 1563.469479] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1563.474773] d_alloc_parallel+0x1478/0x1f40 [ 1563.479325] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1563.483492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.489101] ? check_preemption_disabled+0x48/0x280 [ 1563.494134] ? debug_smp_processor_id+0x1c/0x20 [ 1563.498926] ? perf_trace_lock_acquire+0x15b/0x800 [ 1563.503878] ? wake_up_q+0x100/0x100 [ 1563.507717] ? perf_trace_lock+0x7a0/0x7a0 [ 1563.511963] ? find_held_lock+0x36/0x1c0 [ 1563.516113] ? __lockdep_init_map+0x105/0x590 [ 1563.520640] ? __lockdep_init_map+0x105/0x590 [ 1563.525120] ? lockdep_init_map+0x9/0x10 [ 1563.529240] ? __init_waitqueue_head+0x9e/0x150 [ 1563.533929] ? init_wait_entry+0x1c0/0x1c0 [ 1563.538255] ? lock_acquire+0x1ed/0x520 [ 1563.542240] __lookup_slow+0x1e6/0x540 [ 1563.546190] ? vfs_unlink+0x510/0x510 [ 1563.550035] ? path_init+0x1ed0/0x1ed0 [ 1563.553914] lookup_slow+0x57/0x80 [ 1563.557512] walk_component+0x92b/0x2590 [ 1563.561578] ? trace_hardirqs_on+0xbd/0x310 [ 1563.565960] ? path_init+0x1538/0x1ed0 [ 1563.569857] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.574954] ? pick_link+0xaf0/0xaf0 [ 1563.578725] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.583749] ? set_root+0x42b/0x810 [ 1563.587445] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1563.593005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.598635] ? selinux_inode_permission+0xb7/0x750 [ 1563.603572] ? selinux_capable+0x40/0x40 [ 1563.607890] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.612915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.618515] ? security_inode_permission+0xd2/0x100 [ 1563.623546] ? inode_permission+0xb2/0x560 [ 1563.627837] link_path_walk.part.40+0xa61/0x1530 [ 1563.632684] ? lookup_open+0x1b90/0x1b90 [ 1563.636830] ? walk_component+0x2590/0x2590 [ 1563.641163] ? find_held_lock+0x36/0x1c0 [ 1563.645214] ? check_preemption_disabled+0x48/0x280 [ 1563.650285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.655893] ? percpu_counter_add_batch+0x141/0x190 [ 1563.660909] path_openat+0x270/0x5150 [ 1563.664721] ? zap_class+0x640/0x640 [ 1563.668496] ? path_lookupat.isra.43+0xc00/0xc00 [ 1563.673383] ? unwind_get_return_address+0x61/0xa0 [ 1563.678386] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1563.683408] ? expand_files.part.8+0x571/0x9a0 [ 1563.688060] ? find_held_lock+0x36/0x1c0 [ 1563.692145] ? __alloc_fd+0x347/0x6e0 [ 1563.696016] ? lock_downgrade+0x900/0x900 [ 1563.700192] ? kasan_check_read+0x11/0x20 [ 1563.704478] ? do_raw_spin_unlock+0xa7/0x330 [ 1563.709044] ? do_raw_spin_trylock+0x270/0x270 [ 1563.713895] ? __lock_is_held+0xb5/0x140 [ 1563.718130] ? __check_object_size+0xb1/0x782 [ 1563.722645] ? _raw_spin_unlock+0x2c/0x50 [ 1563.726857] ? __alloc_fd+0x347/0x6e0 [ 1563.730675] do_filp_open+0x255/0x380 [ 1563.734466] ? may_open_dev+0x100/0x100 [ 1563.738498] ? strncpy_from_user+0x411/0x5a0 [ 1563.742925] ? digsig_verify+0x1530/0x1530 [ 1563.747244] ? get_unused_fd_flags+0x122/0x1a0 [ 1563.751839] ? getname_flags+0x26e/0x5a0 [ 1563.755953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1563.761636] do_sys_open+0x568/0x700 [ 1563.765347] ? filp_open+0x80/0x80 [ 1563.768950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1563.774499] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.779659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1563.785206] __x64_sys_openat+0x9d/0x100 [ 1563.789331] do_syscall_64+0x1b9/0x820 [ 1563.793255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1563.798751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1563.803698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1563.808607] ? trace_hardirqs_on_caller+0x310/0x310 [ 1563.813632] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1563.818703] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1563.823745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1563.828650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1563.833861] RIP: 0033:0x457569 [ 1563.837111] Code: Bad RIP value. [ 1563.840477] RSP: 002b:00007fe0ce904c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1563.848237] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 1563.855546] RDX: 0000000000000002 RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1563.862918] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1563.870255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0ce9056d4 [ 1563.877572] R13: 00000000004c2b98 R14: 00000000004d4218 R15: 00000000ffffffff [ 1563.884853] INFO: task syz-executor0:3344 blocked for more than 140 seconds. [ 1563.892109] Not tainted 4.19.0+ #79 [ 1563.896289] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1563.904242] syz-executor0 D23304 3344 5519 0x00000004 [ 1563.909935] Call Trace: [ 1563.912535] __schedule+0x8cf/0x21d0 [ 1563.916302] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1563.921422] ? __sched_text_start+0x8/0x8 [ 1563.925623] ? trace_hardirqs_off_caller+0x310/0x310 [ 1563.930847] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1563.936045] ? prepare_to_wait_event+0x39f/0xa10 [ 1563.940812] ? prepare_to_wait_exclusive+0x480/0x480 [ 1563.946101] schedule+0xfe/0x460 [ 1563.949478] ? __schedule+0x21d0/0x21d0 [ 1563.953446] ? perf_trace_sched_process_exec+0x860/0x860 [ 1563.958948] ? do_raw_spin_unlock+0xa7/0x330 [ 1563.963414] ? do_raw_spin_trylock+0x270/0x270 [ 1563.968069] ? replenish_dl_entity.cold.54+0x36/0x36 [ 1563.973182] ? __might_sleep+0x95/0x190 [ 1563.977219] request_wait_answer+0x4a6/0x900 [ 1563.981642] ? fuse_read_forget.isra.24+0xda0/0xda0 [ 1563.986712] ? finish_wait+0x430/0x430 [ 1563.990608] ? __fuse_request_send+0x11f/0x1d0 [ 1563.995174] ? finish_wait+0x430/0x430 [ 1563.999126] ? finish_wait+0x430/0x430 [ 1564.003031] ? do_raw_spin_trylock+0x270/0x270 [ 1564.007681] ? fuse_dev_ioctl+0x430/0x430 [ 1564.011910] __fuse_request_send+0x12a/0x1d0 [ 1564.016411] fuse_request_send+0x62/0xa0 [ 1564.020487] fuse_simple_request+0x33d/0x730 [ 1564.024889] fuse_lookup_name+0x3ee/0x830 [ 1564.029112] ? fuse_valid_type+0xb0/0xb0 [ 1564.033191] ? mutex_lock_nested+0x16/0x20 [ 1564.037497] fuse_lookup+0xff/0x4c0 [ 1564.041137] ? fuse_lookup_name+0x830/0x830 [ 1564.045448] ? __lockdep_init_map+0x105/0x590 [ 1564.050062] ? lock_acquire+0x1ed/0x520 [ 1564.054061] __lookup_slow+0x2b5/0x540 [ 1564.058009] ? vfs_unlink+0x510/0x510 [ 1564.061839] ? path_init+0x1ed0/0x1ed0 [ 1564.065788] lookup_slow+0x57/0x80 [ 1564.069363] walk_component+0x92b/0x2590 [ 1564.073414] ? trace_hardirqs_on+0xbd/0x310 [ 1564.077787] ? path_init+0x1538/0x1ed0 [ 1564.081682] ? trace_hardirqs_off_caller+0x310/0x310 [ 1564.086845] ? pick_link+0xaf0/0xaf0 [ 1564.090573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.095639] ? set_root+0x42b/0x810 [ 1564.099285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1564.104815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.110426] ? selinux_inode_permission+0xb7/0x750 [ 1564.115372] ? selinux_capable+0x40/0x40 [ 1564.119599] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.124653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.130248] ? security_inode_permission+0xd2/0x100 [ 1564.135276] ? inode_permission+0xb2/0x560 [ 1564.139587] link_path_walk.part.40+0xa61/0x1530 [ 1564.144364] ? lookup_open+0x1b90/0x1b90 [ 1564.148510] ? walk_component+0x2590/0x2590 [ 1564.152844] ? find_held_lock+0x36/0x1c0 [ 1564.156959] ? check_preemption_disabled+0x48/0x280 [ 1564.161988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.167587] ? percpu_counter_add_batch+0x141/0x190 [ 1564.172616] path_openat+0x270/0x5150 [ 1564.176631] ? zap_class+0x640/0x640 [ 1564.180362] ? path_lookupat.isra.43+0xc00/0xc00 [ 1564.185115] ? unwind_get_return_address+0x61/0xa0 [ 1564.190129] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.195160] ? expand_files.part.8+0x571/0x9a0 [ 1564.199820] ? find_held_lock+0x36/0x1c0 [ 1564.203903] ? __alloc_fd+0x347/0x6e0 [ 1564.207759] ? lock_downgrade+0x900/0x900 [ 1564.211922] ? kasan_check_read+0x11/0x20 [ 1564.216126] ? do_raw_spin_unlock+0xa7/0x330 [ 1564.220539] ? do_raw_spin_trylock+0x270/0x270 [ 1564.225107] ? __lock_is_held+0xb5/0x140 [ 1564.229243] ? __check_object_size+0xb1/0x782 [ 1564.233748] ? _raw_spin_unlock+0x2c/0x50 [ 1564.237953] ? __alloc_fd+0x347/0x6e0 [ 1564.241768] do_filp_open+0x255/0x380 [ 1564.245626] ? may_open_dev+0x100/0x100 [ 1564.249734] ? strncpy_from_user+0x411/0x5a0 [ 1564.254138] ? digsig_verify+0x1530/0x1530 [ 1564.258458] ? get_unused_fd_flags+0x122/0x1a0 [ 1564.263053] ? getname_flags+0x26e/0x5a0 [ 1564.267210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1564.272766] do_sys_open+0x568/0x700 [ 1564.276539] ? filp_open+0x80/0x80 [ 1564.280081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.285672] ? trace_hardirqs_off_caller+0x310/0x310 [ 1564.290788] __x64_sys_openat+0x9d/0x100 [ 1564.294838] do_syscall_64+0x1b9/0x820 [ 1564.298793] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1564.304167] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1564.309158] ? trace_hardirqs_on_caller+0x310/0x310 [ 1564.314233] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1564.319333] ? __bpf_trace_signal_deliver+0x40/0x40 [ 1564.324359] ? __switch_to_asm+0x40/0x70 [ 1564.328585] ? __switch_to_asm+0x34/0x70 [ 1564.332721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1564.337657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1564.342854] RIP: 0033:0x457569 [ 1564.346110] Code: Bad RIP value. [ 1564.349480] RSP: 002b:00007fe0ce8e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1564.357248] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 1564.364527] RDX: 0000000000101000 RSI: 00000000200001c0 RDI: ffffffffffffff9c [ 1564.371855] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.379174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0ce8e46d4 [ 1564.386503] R13: 00000000004c2ab5 R14: 00000000004d40b0 R15: 00000000ffffffff [ 1564.393802] INFO: task syz-executor0:3347 blocked for more than 140 seconds. [ 1564.401086] Not tainted 4.19.0+ #79 [ 1564.405236] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1564.413259] syz-executor0 D23776 3347 5519 0x00000004 [ 1564.418948] Call Trace: [ 1564.421536] __schedule+0x8cf/0x21d0 [ 1564.425242] ? __sched_text_start+0x8/0x8 [ 1564.429473] ? zap_class+0x640/0x640 [ 1564.433197] ? find_held_lock+0x36/0x1c0 [ 1564.437340] ? mark_held_locks+0xc7/0x130 [ 1564.441533] schedule+0xfe/0x460 [ 1564.444907] ? lock_downgrade+0x900/0x900 [ 1564.449131] ? __schedule+0x21d0/0x21d0 [ 1564.453119] ? kasan_check_read+0x11/0x20 [ 1564.457413] ? do_raw_spin_unlock+0xa7/0x330 [ 1564.462360] ? do_raw_spin_trylock+0x270/0x270 [ 1564.467015] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1564.472322] d_alloc_parallel+0x1478/0x1f40 [ 1564.476740] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1564.481071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.486700] ? check_preemption_disabled+0x48/0x280 [ 1564.491725] ? debug_smp_processor_id+0x1c/0x20 [ 1564.496453] ? perf_trace_lock_acquire+0x15b/0x800 [ 1564.501395] ? wake_up_q+0x100/0x100 [ 1564.505097] ? perf_trace_lock+0x7a0/0x7a0 [ 1564.509402] ? find_held_lock+0x36/0x1c0 [ 1564.513474] ? __lockdep_init_map+0x105/0x590 [ 1564.518460] ? __lockdep_init_map+0x105/0x590 [ 1564.522969] ? lockdep_init_map+0x9/0x10 [ 1564.527242] ? __init_waitqueue_head+0x9e/0x150 [ 1564.531921] ? init_wait_entry+0x1c0/0x1c0 [ 1564.536314] ? lock_acquire+0x1ed/0x520 [ 1564.540309] __lookup_slow+0x1e6/0x540 [ 1564.544197] ? vfs_unlink+0x510/0x510 [ 1564.548142] ? path_init+0x1ed0/0x1ed0 [ 1564.552049] lookup_slow+0x57/0x80 [ 1564.555654] walk_component+0x92b/0x2590 [ 1564.559724] ? trace_hardirqs_on+0xbd/0x310 [ 1564.564037] ? path_init+0x1538/0x1ed0 [ 1564.567981] ? trace_hardirqs_off_caller+0x310/0x310 [ 1564.573104] ? pick_link+0xaf0/0xaf0 [ 1564.577049] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.582073] ? set_root+0x42b/0x810 [ 1564.585778] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1564.591325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.596927] ? selinux_inode_permission+0xb7/0x750 [ 1564.601869] ? selinux_capable+0x40/0x40 [ 1564.605988] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.611021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.616621] ? security_inode_permission+0xd2/0x100 [ 1564.621648] ? inode_permission+0xb2/0x560 [ 1564.625942] link_path_walk.part.40+0xa61/0x1530 [ 1564.630793] ? lookup_open+0x1b90/0x1b90 [ 1564.634851] ? walk_component+0x2590/0x2590 [ 1564.639318] ? find_held_lock+0x36/0x1c0 [ 1564.643399] ? check_preemption_disabled+0x48/0x280 [ 1564.648593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.654146] ? percpu_counter_add_batch+0x141/0x190 [ 1564.659252] path_openat+0x270/0x5150 [ 1564.663149] ? perf_trace_lock+0x7a0/0x7a0 [ 1564.667496] ? zap_class+0x640/0x640 [ 1564.671228] ? path_lookupat.isra.43+0xc00/0xc00 [ 1564.676050] ? unwind_get_return_address+0x61/0xa0 [ 1564.680989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1564.686086] ? expand_files.part.8+0x571/0x9a0 [ 1564.690681] ? find_held_lock+0x36/0x1c0 [ 1564.694731] ? __alloc_fd+0x347/0x6e0 [ 1564.698588] ? lock_downgrade+0x900/0x900 [ 1564.702749] ? kasan_check_read+0x11/0x20 [ 1564.706950] ? do_raw_spin_unlock+0xa7/0x330 [ 1564.711364] ? do_raw_spin_trylock+0x270/0x270 [ 1564.715999] ? __lock_is_held+0xb5/0x140 [ 1564.720077] ? __check_object_size+0xb1/0x782 [ 1564.724616] ? _raw_spin_unlock+0x2c/0x50 [ 1564.729012] ? __alloc_fd+0x347/0x6e0 [ 1564.732872] do_filp_open+0x255/0x380 [ 1564.736743] ? may_open_dev+0x100/0x100 [ 1564.740735] ? get_unused_fd_flags+0x122/0x1a0 [ 1564.745301] ? __alloc_fd+0x6e0/0x6e0 [ 1564.749170] do_sys_open+0x568/0x700 [ 1564.752900] ? filp_open+0x80/0x80 [ 1564.756518] ? trace_hardirqs_off_caller+0x310/0x310 [ 1564.761632] __x64_sys_open+0x7e/0xc0 [ 1564.765473] do_syscall_64+0x1b9/0x820 [ 1564.769544] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1564.774921] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1564.779910] ? trace_hardirqs_on_caller+0x310/0x310 [ 1564.785022] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1564.790135] ? __bpf_trace_signal_deliver+0x40/0x40 [ 1564.795164] ? __switch_to_asm+0x40/0x70 [ 1564.799290] ? __switch_to_asm+0x34/0x70 [ 1564.803369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1564.808278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1564.813480] RIP: 0033:0x4111a1 [ 1564.816797] Code: Bad RIP value. [ 1564.820172] RSP: 002b:00007fe0ce8c27a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1564.827935] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004111a1 [ 1564.835316] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fe0ce8c2850 [ 1564.842653] RBP: 000000000072c040 R08: 000000000000000f R09: 0000000000000000 [ 1564.849967] R10: 0000000000000000 R11: 0000000000000293 R12: 00007fe0ce8c36d4 [ 1564.857293] R13: 00000000004c4ccb R14: 00000000004d80a0 R15: 00000000ffffffff [ 1564.864593] INFO: task syz-executor0:3349 blocked for more than 140 seconds. [ 1564.871940] Not tainted 4.19.0+ #79 [ 1564.876122] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1564.884149] syz-executor0 D23352 3349 5519 0x00000004 [ 1564.889864] Call Trace: [ 1564.892461] __schedule+0x8cf/0x21d0 [ 1564.896264] ? __sched_text_start+0x8/0x8 [ 1564.900424] ? zap_class+0x640/0x640 [ 1564.904125] ? find_held_lock+0x36/0x1c0 [ 1564.908267] ? mark_held_locks+0xc7/0x130 [ 1564.912438] schedule+0xfe/0x460 [ 1564.915894] ? lock_downgrade+0x900/0x900 [ 1564.920054] ? __schedule+0x21d0/0x21d0 [ 1564.924017] ? kasan_check_read+0x11/0x20 [ 1564.928224] ? do_raw_spin_unlock+0xa7/0x330 [ 1564.932637] ? do_raw_spin_trylock+0x270/0x270 [ 1564.937276] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1564.942566] d_alloc_parallel+0x1478/0x1f40 [ 1564.947045] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1564.951318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1564.956926] ? check_preemption_disabled+0x48/0x280 [ 1564.961953] ? debug_smp_processor_id+0x1c/0x20 [ 1564.966694] ? perf_trace_lock_acquire+0x15b/0x800 [ 1564.971635] ? wake_up_q+0x100/0x100 [ 1564.975339] ? perf_trace_lock+0x7a0/0x7a0 [ 1564.979627] ? find_held_lock+0x36/0x1c0 [ 1564.983698] ? __lockdep_init_map+0x105/0x590 [ 1564.988247] ? __lockdep_init_map+0x105/0x590 [ 1564.992749] ? lockdep_init_map+0x9/0x10 [ 1564.996880] ? __init_waitqueue_head+0x9e/0x150 [ 1565.001557] ? init_wait_entry+0x1c0/0x1c0 [ 1565.005850] ? lock_acquire+0x1ed/0x520 [ 1565.009836] __lookup_slow+0x1e6/0x540 [ 1565.013718] ? vfs_unlink+0x510/0x510 [ 1565.017623] ? path_init+0x1ed0/0x1ed0 [ 1565.021537] lookup_slow+0x57/0x80 [ 1565.025064] walk_component+0x92b/0x2590 [ 1565.029176] ? trace_hardirqs_on+0xbd/0x310 [ 1565.033502] ? path_init+0x1538/0x1ed0 [ 1565.037534] ? trace_hardirqs_off_caller+0x310/0x310 [ 1565.042653] ? pick_link+0xaf0/0xaf0 [ 1565.046436] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.051509] ? set_root+0x42b/0x810 [ 1565.055131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1565.060732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.066314] ? selinux_inode_permission+0xb7/0x750 [ 1565.071238] ? selinux_capable+0x40/0x40 [ 1565.075283] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.080357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.085954] ? security_inode_permission+0xd2/0x100 [ 1565.090968] ? inode_permission+0xb2/0x560 [ 1565.095189] link_path_walk.part.40+0xa61/0x1530 [ 1565.100000] ? lookup_open+0x1b90/0x1b90 [ 1565.104085] ? walk_component+0x2590/0x2590 [ 1565.108463] ? find_held_lock+0x36/0x1c0 [ 1565.112530] ? check_preemption_disabled+0x48/0x280 [ 1565.117625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.123301] ? percpu_counter_add_batch+0x141/0x190 [ 1565.128398] path_openat+0x270/0x5150 [ 1565.132215] ? zap_class+0x640/0x640 [ 1565.136177] ? path_lookupat.isra.43+0xc00/0xc00 [ 1565.140941] ? unwind_get_return_address+0x61/0xa0 [ 1565.145923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.150944] ? expand_files.part.8+0x571/0x9a0 [ 1565.155700] ? find_held_lock+0x36/0x1c0 [ 1565.159777] ? __alloc_fd+0x347/0x6e0 [ 1565.163643] ? lock_downgrade+0x900/0x900 [ 1565.167871] ? kasan_check_read+0x11/0x20 [ 1565.172034] ? do_raw_spin_unlock+0xa7/0x330 [ 1565.176520] ? do_raw_spin_trylock+0x270/0x270 [ 1565.181119] ? __lock_is_held+0xb5/0x140 [ 1565.185264] ? __check_object_size+0xb1/0x782 [ 1565.189842] ? _raw_spin_unlock+0x2c/0x50 [ 1565.194053] ? __alloc_fd+0x347/0x6e0 [ 1565.197940] do_filp_open+0x255/0x380 [ 1565.201750] ? may_open_dev+0x100/0x100 [ 1565.205775] ? strncpy_from_user+0x411/0x5a0 [ 1565.210194] ? digsig_verify+0x1530/0x1530 [ 1565.214417] ? get_unused_fd_flags+0x122/0x1a0 [ 1565.219068] ? getname_flags+0x26e/0x5a0 [ 1565.223133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1565.228732] do_sys_open+0x568/0x700 [ 1565.232460] ? filp_open+0x80/0x80 [ 1565.236061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.241725] ? trace_hardirqs_off_caller+0x310/0x310 [ 1565.246897] __x64_sys_openat+0x9d/0x100 [ 1565.250972] do_syscall_64+0x1b9/0x820 [ 1565.254853] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1565.260282] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1565.265219] ? trace_hardirqs_on_caller+0x310/0x310 [ 1565.270350] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1565.275385] ? __bpf_trace_signal_deliver+0x40/0x40 [ 1565.280469] ? __switch_to_asm+0x40/0x70 [ 1565.284537] ? __switch_to_asm+0x34/0x70 [ 1565.288656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1565.293514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1565.298866] RIP: 0033:0x457569 [ 1565.302063] Code: Bad RIP value. [ 1565.305414] RSP: 002b:00007fe0ce8a1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1565.313192] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 1565.320501] RDX: 0000000000008000 RSI: 0000000020000740 RDI: ffffffffffffff9c [ 1565.327824] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1565.335170] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe0ce8a26d4 [ 1565.342543] R13: 00000000004c2cbf R14: 00000000004d4428 R15: 00000000ffffffff [ 1565.349869] INFO: task syz-executor0:3353 blocked for more than 140 seconds. [ 1565.357124] Not tainted 4.19.0+ #79 [ 1565.361269] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1565.369313] syz-executor0 D24232 3353 5519 0x00000004 [ 1565.374959] Call Trace: [ 1565.377619] __schedule+0x8cf/0x21d0 [ 1565.381348] ? __sched_text_start+0x8/0x8 [ 1565.385484] ? zap_class+0x640/0x640 [ 1565.389345] ? find_held_lock+0x36/0x1c0 [ 1565.393497] ? mark_held_locks+0xc7/0x130 [ 1565.397738] schedule+0xfe/0x460 [ 1565.401113] ? lock_downgrade+0x900/0x900 [ 1565.405246] ? __schedule+0x21d0/0x21d0 [ 1565.409281] ? kasan_check_read+0x11/0x20 [ 1565.413443] ? do_raw_spin_unlock+0xa7/0x330 [ 1565.418022] ? do_raw_spin_trylock+0x270/0x270 [ 1565.422625] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1565.427971] d_alloc_parallel+0x1478/0x1f40 [ 1565.432363] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1565.436589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.442143] ? check_preemption_disabled+0x48/0x280 [ 1565.447242] ? debug_smp_processor_id+0x1c/0x20 [ 1565.451919] ? perf_trace_lock_acquire+0x15b/0x800 [ 1565.456905] ? wake_up_q+0x100/0x100 [ 1565.460642] ? perf_trace_lock+0x7a0/0x7a0 [ 1565.464863] ? find_held_lock+0x36/0x1c0 [ 1565.468999] ? __lockdep_init_map+0x105/0x590 [ 1565.473531] ? __lockdep_init_map+0x105/0x590 [ 1565.478207] ? lockdep_init_map+0x9/0x10 [ 1565.482279] ? __init_waitqueue_head+0x9e/0x150 [ 1565.487003] ? init_wait_entry+0x1c0/0x1c0 [ 1565.491258] ? lock_acquire+0x1ed/0x520 [ 1565.495225] __lookup_slow+0x1e6/0x540 [ 1565.499187] ? vfs_unlink+0x510/0x510 [ 1565.503010] ? path_init+0x1ed0/0x1ed0 [ 1565.506964] lookup_slow+0x57/0x80 [ 1565.510521] walk_component+0x92b/0x2590 [ 1565.514569] ? trace_hardirqs_on+0xbd/0x310 [ 1565.518945] ? path_init+0x1538/0x1ed0 [ 1565.522837] ? trace_hardirqs_off_caller+0x310/0x310 [ 1565.527999] ? pick_link+0xaf0/0xaf0 [ 1565.531732] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.536798] ? set_root+0x42b/0x810 [ 1565.540431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1565.546054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.551601] ? selinux_inode_permission+0xb7/0x750 [ 1565.556589] ? selinux_capable+0x40/0x40 [ 1565.560661] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.565747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.571297] ? security_inode_permission+0xd2/0x100 [ 1565.576380] ? inode_permission+0xb2/0x560 [ 1565.580629] link_path_walk.part.40+0xa61/0x1530 [ 1565.585484] ? lookup_open+0x1b90/0x1b90 [ 1565.589638] ? walk_component+0x2590/0x2590 [ 1565.593972] ? __ia32_sys_membarrier+0x150/0x150 [ 1565.598787] ? kmem_cache_alloc+0x33a/0x730 [ 1565.603124] ? selinux_file_alloc_security+0xb4/0x190 [ 1565.608389] path_lookupat.isra.43+0xf7/0xc00 [ 1565.613043] ? file_free_rcu+0xd0/0xd0 [ 1565.617009] ? path_parentat.isra.41+0x160/0x160 [ 1565.621782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.627380] ? check_preemption_disabled+0x48/0x280 [ 1565.632413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1565.638004] ? percpu_counter_add_batch+0x141/0x190 [ 1565.643056] path_openat+0x2857/0x5150 [ 1565.647011] ? perf_trace_lock+0x7a0/0x7a0 [ 1565.651263] ? zap_class+0x640/0x640 [ 1565.654963] ? path_lookupat.isra.43+0xc00/0xc00 [ 1565.659768] ? unwind_get_return_address+0x61/0xa0 [ 1565.664708] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1565.669825] ? expand_files.part.8+0x571/0x9a0 [ 1565.674451] ? find_held_lock+0x36/0x1c0 [ 1565.678575] ? __alloc_fd+0x347/0x6e0 [ 1565.682390] ? lock_downgrade+0x900/0x900 [ 1565.686599] ? kasan_check_read+0x11/0x20 [ 1565.690761] ? do_raw_spin_unlock+0xa7/0x330 [ 1565.695155] ? do_raw_spin_trylock+0x270/0x270 [ 1565.699796] ? __lock_is_held+0xb5/0x140 [ 1565.703862] ? __check_object_size+0xb1/0x782 [ 1565.708419] ? _raw_spin_unlock+0x2c/0x50 [ 1565.712578] ? __alloc_fd+0x347/0x6e0 [ 1565.716581] do_filp_open+0x255/0x380 [ 1565.720497] ? may_open_dev+0x100/0x100 [ 1565.724469] ? get_unused_fd_flags+0x122/0x1a0 [ 1565.729106] ? __alloc_fd+0x6e0/0x6e0 [ 1565.732921] do_sys_open+0x568/0x700 [ 1565.736693] ? filp_open+0x80/0x80 [ 1565.740250] ? trace_hardirqs_off_caller+0x310/0x310 [ 1565.745343] __x64_sys_open+0x7e/0xc0 [ 1565.749199] do_syscall_64+0x1b9/0x820 [ 1565.753103] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1565.758586] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1565.763538] ? trace_hardirqs_on_caller+0x310/0x310 [ 1565.768619] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1565.773658] ? __bpf_trace_signal_deliver+0x40/0x40 [ 1565.778728] ? __switch_to_asm+0x40/0x70 [ 1565.782798] ? __switch_to_asm+0x34/0x70 [ 1565.786930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1565.791794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1565.797039] RIP: 0033:0x4111a1 [ 1565.800241] Code: Bad RIP value. [ 1565.803590] RSP: 002b:00007fe0ce83e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1565.811343] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004111a1 [ 1565.818655] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007fe0ce83e850 [ 1565.825986] RBP: 000000000072c2c0 R08: 000000000000000f R09: 0000000000000000 [ 1565.833270] R10: 00007fe0ce83f9d0 R11: 0000000000000293 R12: 00007fe0ce83f6d4 [ 1565.840592] R13: 00000000004c4c5a R14: 00000000004d8010 R15: 00000000ffffffff [ 1565.847914] [ 1565.847914] Showing all locks held in the system: [ 1565.854225] 1 lock held by khungtaskd/978: [ 1565.858493] #0: 000000002acbcca4 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1565.867194] 1 lock held by rsyslogd/5355: [ 1565.871326] #0: 00000000448a567e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1565.879366] 2 locks held by getty/5478: [ 1565.883335] #0: 00000000be50e996 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.891628] #1: 0000000003a10d90 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1565.900625] 2 locks held by getty/5479: [ 1565.904584] #0: 000000007cf9529e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.912890] #1: 00000000cdca8ce1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1565.921829] 2 locks held by getty/5480: [ 1565.925844] #0: 00000000e6381e2d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.934127] #1: 0000000004425712 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1565.943039] 2 locks held by getty/5481: [ 1565.947047] #0: 00000000a41a7a79 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.955305] #1: 000000000c465e6c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1565.964219] 2 locks held by getty/5482: [ 1565.968235] #0: 00000000ceaad1c5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.976579] #1: 000000009add706d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1565.985472] 2 locks held by getty/5483: [ 1565.989482] #0: 00000000e79fc7e0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1565.997795] #1: 00000000188729a3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1566.006701] 2 locks held by getty/5484: [ 1566.010671] #0: 00000000bd5e3d62 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1566.018992] #1: 0000000074649eeb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 1566.027934] 2 locks held by syz-executor0/5519: [ 1566.032584] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.041345] #1: 00000000948bb730 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xba/0xf0 [ 1566.049397] 1 lock held by syz-executor0/3337: [ 1566.053974] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.062731] 2 locks held by syz-executor0/3344: [ 1566.067430] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.076158] #1: 00000000948bb730 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xba/0xf0 [ 1566.084008] 1 lock held by syz-executor0/3347: [ 1566.088645] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.097408] 1 lock held by syz-executor0/3349: [ 1566.101974] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.110978] 1 lock held by syz-executor0/3353: [ 1566.115713] #0: 0000000084074cee (&type->i_mutex_dir_key#7){++++}, at: lookup_slow+0x49/0x80 [ 1566.124428] [ 1566.126105] ============================================= [ 1566.126105] [ 1566.133126] NMI backtrace for cpu 0 [ 1566.136801] CPU: 0 PID: 978 Comm: khungtaskd Not tainted 4.19.0+ #79 [ 1566.143297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1566.152633] Call Trace: [ 1566.155208] dump_stack+0x244/0x39d [ 1566.158822] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1566.164016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1566.169568] nmi_cpu_backtrace.cold.1+0x5c/0xa1 [ 1566.174272] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 1566.179459] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 1566.184740] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1566.189916] watchdog+0xb3e/0x1050 [ 1566.193449] ? reset_hung_task_detector+0xd0/0xd0 [ 1566.198304] ? __kthread_parkme+0xce/0x1a0 [ 1566.202532] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1566.207632] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1566.212735] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1566.217303] ? trace_hardirqs_on+0xbd/0x310 [ 1566.221610] ? kasan_check_read+0x11/0x20 [ 1566.225743] ? __kthread_parkme+0xce/0x1a0 [ 1566.229963] ? trace_hardirqs_off_caller+0x310/0x310 [ 1566.235051] ? trace_hardirqs_off_caller+0x310/0x310 [ 1566.240153] ? lockdep_init_map+0x9/0x10 [ 1566.244203] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1566.249296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1566.254817] ? __kthread_parkme+0xfb/0x1a0 [ 1566.259046] kthread+0x35a/0x420 [ 1566.262398] ? reset_hung_task_detector+0xd0/0xd0 [ 1566.267224] ? kthread_stop+0x900/0x900 [ 1566.271187] ret_from_fork+0x3a/0x50 [ 1566.275063] Sending NMI from CPU 0 to CPUs 1: [ 1566.279666] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x6/0x10 [ 1566.280678] Kernel panic - not syncing: hung_task: blocked tasks [ 1566.293355] CPU: 0 PID: 978 Comm: khungtaskd Not tainted 4.19.0+ #79 [ 1566.299834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1566.309175] Call Trace: [ 1566.311753] dump_stack+0x244/0x39d [ 1566.315367] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1566.320553] panic+0x238/0x4e7 [ 1566.323728] ? add_taint.cold.5+0x16/0x16 [ 1566.327868] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1566.333305] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 1566.338742] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 1566.344182] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 1566.349622] watchdog+0xb4f/0x1050 [ 1566.353161] ? reset_hung_task_detector+0xd0/0xd0 [ 1566.358009] ? __kthread_parkme+0xce/0x1a0 [ 1566.362237] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1566.367325] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1566.372418] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1566.376985] ? trace_hardirqs_on+0xbd/0x310 [ 1566.381294] ? kasan_check_read+0x11/0x20 [ 1566.385429] ? __kthread_parkme+0xce/0x1a0 [ 1566.389647] ? trace_hardirqs_off_caller+0x310/0x310 [ 1566.394736] ? trace_hardirqs_off_caller+0x310/0x310 [ 1566.399824] ? lockdep_init_map+0x9/0x10 [ 1566.403873] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1566.408958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1566.414479] ? __kthread_parkme+0xfb/0x1a0 [ 1566.418700] kthread+0x35a/0x420 [ 1566.422053] ? reset_hung_task_detector+0xd0/0xd0 [ 1566.426880] ? kthread_stop+0x900/0x900 [ 1566.430840] ret_from_fork+0x3a/0x50 [ 1566.435779] Kernel Offset: disabled [ 1566.439411] Rebooting in 86400 seconds..