YBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c4d726f75705f6983c2", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x8055, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={r2, 0x1f}, &(0x7f0000000480)=0x8) 23:20:26 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x804) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000b, 0x0) 23:20:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4000000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f6, 0x0) 23:20:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={r2, 0x1f}, &(0x7f0000000480)=0x8) 23:20:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000141, 0x0) 23:20:27 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x3f00) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c) finit_module(r0, &(0x7f0000000400)='default_permissions', 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065724d697373696f6ef45a492856d3ddbc732c00"]) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f6, 0x0) 23:20:27 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016c, 0x0) 23:20:27 executing program 4: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000011000/0xc000)=nil) shmat(r0, &(0x7f0000013000/0x2000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x20000) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080), 0xffffffffffffffb4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0xffffffffffffa8a6, 0x1) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:20:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x799e030000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000001c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:27 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x3000000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x34000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) 23:20:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000018a, 0x0) 23:20:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xa00000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:27 executing program 4: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000011000/0xc000)=nil) shmat(r0, &(0x7f0000013000/0x2000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x20000) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080), 0xffffffffffffffb4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0xffffffffffffa8a6, 0x1) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:20:27 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000159, 0x0) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x2000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 5: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x4) r1 = memfd_create(&(0x7f0000000040)='posix_acl_access\x00', 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) 23:20:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") close(r0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x2) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f00000000c0)={0x9, 0xfff, 0x6}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x290101, 0x0) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 4: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000011000/0xc000)=nil) shmat(r0, &(0x7f0000013000/0x2000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x20000) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080), 0xffffffffffffffb4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r4, 0x6) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0xffffffffffffa8a6, 0x1) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:20:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x900, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000002c, 0x0) 23:20:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="a3542c67726f75705f69", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:28 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x3000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x3400, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:28 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x84, 0x2}, 0xffffffffffffffe0}}, 0x18) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 23:20:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000082, 0x0) 23:20:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x3, {0x8}}, 0x18) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cb, 0x0) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x40000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x30000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000174, 0x0) 23:20:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c7, 0x0) 23:20:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x5580, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) ioctl(r0, 0xfff, &(0x7f0000000040)) 23:20:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:29 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0xffffff8c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x8055000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="663d9e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000000000400p4,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x505302, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000500)=""/113) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x3, 0x0) sendto$unix(r2, &(0x7f0000000400)="6c85f9ae1679e8e814ceb49b9185dcefbc43c2480a7e6577be8fe1ab023f77af2a825eda7d8bc00e0f655efb4c7dcf3780d03271e2124b6c0bab39ebcf9de194aff4ac3d284ebc20b56eb1ebaa6f3acdcee8c48356627357dd21687e2f5cdc776ae2b0e52e77ece8da3c3666c2b8793856242c65d96770ffa5166570a77b2acf60bef37423227426de9558b316960f456ded813186063ef87740e37fb8dd68ff5987d03374034a6269b0a0db8919d676da3b3cefc43d01f84ef710129831dc04c15b49f515bc041a2ee12263cf7005b5c988ea60776324c4a12c961458ba662829fe8e3aa3c9cf460f459e86", 0xec, 0x44, 0x0, 0x0) 23:20:29 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x84, 0x2}, 0xffffffffffffffe0}}, 0x18) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 23:20:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x200000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000203, 0x0) 23:20:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x28000) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000001c0)={0x3}) 23:20:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000008f, 0x0) 23:20:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x100000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000086, 0x0) 23:20:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000159, 0x0) 23:20:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) 23:20:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe803000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:30 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x30) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xf4010000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x0) 23:20:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x10000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e7, 0x0) 23:20:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x40020000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000025e, 0x0) 23:20:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000bd, 0x0) 23:20:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), 0x8) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x9}, r1}}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000080)={0x8, 0xd9}) 23:20:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0xf6ffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x80550000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:31 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b0, 0x0) 23:20:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9725, 0x42) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000200)=0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) 23:20:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x30) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x10, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x80550000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:31 executing program 4: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x5, 0x6, 0x8, 0x9, 0x8b, 0x5c5f, 0x6, 0x7}, &(0x7f0000000040)={0x2, 0x9, 0x0, 0x1000, 0xfffffffffffffffa, 0x3ff, 0x400, 0x5}, &(0x7f0000000080)={0x80000001, 0x3, 0xfffffffffffffffb, 0x1000, 0xffffffff, 0x9, 0x1, 0x100000000}, &(0x7f0000000140)={r0, r1+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x5}, 0x8}) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000020ff0)=[{&(0x7f0000000240)="2f0000001c0005c5ffffff000d0000000200001f01000000ec0002c91300010000000000000000005867000043050b", 0x2f}], 0x1}, 0x0) 23:20:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000263, 0x0) 23:20:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x8cffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x700000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:31 executing program 4: r0 = socket$inet6(0xa, 0x28000003, 0x6) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000300)={0x7, 0x3}) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x3}, 0x4) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'bond0\x00', {0x2, 0x4e22}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000340)={'syz_tun\x00', {0x2, 0x4e24, @rand_addr=0x5}}) r3 = mmap$binder(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x5, 0x21050, r2, 0x0) r4 = mmap$binder(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000008c0)={0xb8, 0x0, &(0x7f0000000740)=[@clear_death={0x400c630f, 0x1, 0x1}, @free_buffer={0x40086303, r3}, @exit_looper, @transaction={0x40406300, {0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x38, 0x30, &(0x7f00000005c0)=[@flat={0x736a2a85, 0xa, r4, 0x1}, @fda={0x66646185, 0x2, 0x2, 0x19}], &(0x7f0000000600)=[0x30, 0x38, 0x78, 0x40, 0x40, 0x0]}}, @transaction_sg={0x40486311, {{0x2, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x60, 0x28, &(0x7f0000000680)=[@ptr={0x70742a85, 0x0, &(0x7f0000000640), 0x1, 0x0, 0x3a}, @fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x8, 0x1, 0x2e}], &(0x7f0000000700)=[0x58, 0x18, 0x0, 0x68, 0x38]}, 0x9}}, @acquire], 0x9b, 0x0, &(0x7f0000000800)="badcc1ab31b35408687baed9cc228c96ac6a58c11f1950cdf4c159a16a2387b0d9be3bfc323fdaa50ed852fdf1825f3e1c936bd311349399ae3d48bddafbdc7a13eda7f523343cfa9c59d002e327ebe393ecf2335667ea74a59610b7627c00ba1697a5923d4f359314f22a4e188b7075fd3baee67ced38557012fc6b10c5f9ae2a7bd9f1d23fe0811059b0816acaad593946ff7b961a48fdd9803c"}) sendto$inet6(r0, &(0x7f0000000940)="f20bb97359b23166180efd2bd1c1cd43f310c2a16bfba06915e3c938709c7362cd5995d97d10e784466d554fd0ed41687aff1a85d5d7809ef23fee49eea2215d42a40035cca8848022bbdac03e0f33d6198697168c014a5e9698ae8fecfa9a5ee40eca5a10fe2bc50f9639ab02d35f19e0e3dbecafb24b0c94a0be", 0x7b, 0x4040084, &(0x7f00000009c0)={0xa, 0x4e22, 0x1ff, @mcast1}, 0x1c) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000a00)={0xc9, 0x80, 0x1, "2737dc57b5d069b9f60331001c798e7895dbeff17e401ebbd107096c7b76be54a930f9f348794c671f06aa907789a1723f39f8ddc400ba51fa6f03393ce032862d66ae464628d73884c8400292a0b0e0252f83f817302220299780ad8b185b1af98915889f591c89cd856966ab169c73c11a4eca0c532ce67aa5cc6dea86dd1c2c68b913cae4c6dfa36b82c7ee8978f37b74ba1c34b11ac5da2b7e5b9bf631428b0a7a82c0bfe516a35bd5f19dfbf7f75983d0096b48d5f70cea3db48d3aa62dd7c1bb5e7ebdc36771"}) request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='em0\x00', 0x0) gettid() r5 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000003c0)={@empty, @dev, 0x0}, &(0x7f0000000400)=0xc) r7 = geteuid() setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000900)={0x77, @multicast1, 0x4e21, 0x1, 'nq\x00', 0x28, 0xce5b, 0x6c}, 0x2c) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800902}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)=@report={0xf8, 0x20, 0x800, 0x1, 0x25dfdbfe, {0xff, {@in6=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4e23, 0x0, 0x4e23, 0x7, 0xa, 0xa0, 0xa0, 0x3a, r6, r7}}, [@migrate={0x88, 0x11, [{@in=@multicast1, @in=@dev={0xac, 0x14, 0x14, 0xe90}, 0x3c, 0x3, 0x0, 0x3507, 0xa, 0xa}, {@in=@remote, @in6=@remote, 0x2b, 0x3, 0x0, 0x3505, 0xa, 0x2}, {@in=@local, @in=@loopback, 0x32, 0x1, 0x0, 0x3503, 0xa, 0xa}]}, @srcaddr={0x14, 0xd, @in6=@dev={0xfe, 0x80, [], 0x1f}}, @ipv4_hthresh={0x8, 0x3, {0x1e, 0x4}}, @tfcpad={0x8, 0x16, 0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x1}, 0x4) keyctl$unlink(0x9, r5, r5) 23:20:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:31 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000116, 0x0) 23:20:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000008000100000002004000000000010000000000000025000000ffffffff00040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f00000001c0)={0x10000000000000e9, 0x0, [{0x390}]}) 23:20:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017c, 0x0) 23:20:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x9) ioctl(r0, 0x8910, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x6feb, 0x200001) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000000c0)) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) socket$inet_sctp(0x2, 0x5, 0x84) 23:20:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x1, 0xfffffffeffffffff, 0x9d8d, 0x1000, 0x6, 0x2, 0x7, 0x80000000, 0x3, 0x10001}, 0xb) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a40)={0x0, 0x10, "25101cedfb000e767b8974ad20ec903d"}, &(0x7f0000000b00)=0x18) 23:20:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x3f00000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:31 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000230, 0x0) 23:20:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x4000000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x38d, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000100)=r2) r3 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4}, 0x14) sendmsg$netlink(r3, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000002c80), 0x0, &(0x7f0000003200)=[@rights={0x10}, @rights={0x10}], 0x20}, 0x0) 23:20:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket(0x3, 0x4, 0x1ff) r1 = socket(0x40000000001e, 0x1, 0x0) setsockopt(r1, 0x10f, 0x7f, &(0x7f0000000180)="76e927ce", 0x4) 23:20:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x11000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:32 executing program 4: bpf$MAP_CREATE(0x344c, &(0x7f0000c47fec), 0x14) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000003c0)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x51, 0x10000, 0x1, {0x4895ffc1, 0x6}, {}, @cond=[{0xf3, 0x100000001, 0x9, 0x2, 0x4}, {0x0, 0x0, 0x4a4800000000000, 0x1, 0x2a6, 0x5}]}) 23:20:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000ea, 0x0) 23:20:32 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f4, 0x0) [ 251.367406] QAT: Invalid ioctl [ 251.383930] QAT: Invalid ioctl 23:20:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 251.408079] Trying to set illegal importance in message 23:20:32 executing program 4: r0 = socket(0xa, 0x1, 0x0) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x4, 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mq_unlink(&(0x7f0000000040)='wlan1em1:lobdev\x00') getdents(0xffffffffffffffff, &(0x7f0000000200)=""/143, 0x29) getdents(0xffffffffffffffff, &(0x7f0000000100)=""/182, 0xb6) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) write$tun(r1, &(0x7f00000002c0)={@void, @void, @ipv4={{0x17, 0x4, 0x8, 0x100000001, 0x7d, 0x68, 0x8, 0xffffffffffffffc0, 0x62, 0x0, @dev={0xac, 0x14, 0x14, 0x21}, @local, {[@ra={0x94, 0x6, 0x800}, @generic={0x88, 0x7, "b73c80d6a4"}, @timestamp={0x44, 0x14, 0x3, 0x3, 0x0, [{[], 0x2b}, {[], 0xe8}, {[@local], 0x7050a467}]}, @cipso={0x86, 0x1b, 0x9, [{0x1, 0x7, "b0edef786c"}, {0x0, 0xe, "d306b48e11a33f9ce72116ea"}]}, @ra={0x94, 0x6, 0x80000000}, @ra={0x94, 0x6, 0x5}]}}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x4, 0x3ff, 0x4, 0x66, 0x3, 0x9, 0x6b, 0x5558, @broadcast, @multicast2}, "fd83e16788"}}}, 0x7d) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, r2) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x100) 23:20:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) [ 251.454110] Trying to set illegal importance in message 23:20:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x799e0300, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001780), 0x1000) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lremovexattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'system(md5sum\x00'}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000130000002b73797374656dcc637007000200000000007570246367726f75701500000000"], 0x90) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000001640)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x1, {"47701e52a22166d76dc26d40820a0393"}, 0x5, 0xfffffffffffffff8, 0x9}, @ib={0x1b, 0x8, 0x3, {"59b1059110148ad8b2eaeb04cff43e8a"}, 0xffffffff, 0xf8f0}}}, 0x118) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000180)) 23:20:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0xfffffffffffffffe) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2}) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3}) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r2, 0x4, 0x1, r2}) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="3f404ae56f3fcf0bb80ba12cf5ed4aeae39a808b2031cccac90b12c6718b277abf92f2f54e32d7b1dd42da7a42892c75c812e6d04b3b2f1631511571ef4519afc58efe92594c7e3491dc067e1f073158ec435897df8df7dfb65f018c5dbcf3d853f109501b57fd8f990f4ec04fe9830cc800b93cb48695a1a7dc7118b7e7b58fcb323f9b6ff6", 0x86, 0xfffffffffffffff8) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000300), 0x4) keyctl$reject(0x13, r4, 0x3f, 0xfffffffffffff73c, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r3, 0x0, 0x1}) 23:20:32 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x200000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:32 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:32 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001780), 0x1000) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lremovexattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'system(md5sum\x00'}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000130000002b73797374656dcc637007000200000000007570246367726f75701500000000"], 0x90) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000001640)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x1, {"47701e52a22166d76dc26d40820a0393"}, 0x5, 0xfffffffffffffff8, 0x9}, @ib={0x1b, 0x8, 0x3, {"59b1059110148ad8b2eaeb04cff43e8a"}, 0xffffffff, 0xf8f0}}}, 0x118) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000180)) 23:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000480)="290000002000190f00003fffffffda060200000000e80001040000030d000d00ea1100000005000000", 0x29}], 0xc29837f) 23:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x34, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:33 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000228, 0x0) 23:20:33 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x1000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0xfffffffffffffa1c, 0x4) getsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f00000000c0), &(0x7f0000000080)=0x89) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) 23:20:33 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b5, 0x0) 23:20:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="aa5a00001a001707000000000000000800010000000000080000000000000000f5f3407673cb8ff209160859a37efa7321dc13079ae654010b774abb3c7f1fce5ccc8da526abf85e7a0e051f1819fd158b2c1d059d680d859cd2bef2d7f08680961101ed399ccd67ed6963838cea9c67fc083101a7baf759ef10e0ed8d117b355235d6daf457c36bb6958e9e46", @ANYRES32=0x0], 0x24}}, 0x0) 23:20:33 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0xfffffffffffffa1c, 0x4) getsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f00000000c0), &(0x7f0000000080)=0x89) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) 23:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x11, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:33 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0xf6ffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:33 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367296f75702f73797a3100b6d74eb6b86f3ca14a6ad06b1945185829497093bc9429f257672a459ffe8196e6d0bff1493c465a1445658cf500895581100040b7ad6146942cdd5d569cabc4658f7a1b162b453defe86d1b7392d6948c488b406adad25f0e82998aab13aa7d76a7bea629e392181315025d2fe1546e481eeff8d929b56b60fc6d4f36871f72dbc27eaea3a00000000000000000000000", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpu.weight.nice\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0x0) 23:20:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x3f, 0x19, 0x6, 0x0, "d81d5b218e184651d2ca07c8fe33441820214275b5dc1513453d41ff4bdd7266"}) ioctl$EVIOCGABS0(r1, 0x40084504, &(0x7f00000004c0)=""/240) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x10000) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x1) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000080)) 23:20:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x34000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:33 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:34 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001d5, 0x0) 23:20:34 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[{}, {}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) capget(&(0x7f00000000c0)={0x200f1526, r1}, &(0x7f0000000100)={0x2, 0x3ff, 0x80000001, 0x5, 0x2, 0x9332db3}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000000)={'ip6gre0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 23:20:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x20000000802, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)}, 0x0) write(r1, &(0x7f0000000100)="240000001a0025f00018000400edfc0e8000000000000000000000000800020048050000", 0x24) 23:20:34 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe00000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000003d, 0x0) 23:20:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0xf6ffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:34 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) read(r0, &(0x7f0000000300)=""/182, 0xb6) r1 = socket$inet6(0xa, 0x80001, 0x20000001f) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") bind$vsock_stream(r0, &(0x7f0000000000), 0x10) write$FUSE_ATTR(r0, &(0x7f00000001c0)={0x78, 0x0, 0x1, {0x800000000007, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}}, 0x78) 23:20:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000208, 0x0) 23:20:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe8030000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) [ 253.144659] CUSE: zero length info key specified 23:20:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000121, 0x0) 23:20:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x80000000) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0x11, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x11, &(0x7f0000000000)=0xffffffffffffffff, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e20}}, 0xffffffffffffff1a, 0xffff}, &(0x7f0000000240)=0x90) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100), 0x5e0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) 23:20:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xffffff7f, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:34 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x335, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000001c0)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000140)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) 23:20:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='-]!\x00', 0xffffffffffffff9c}, 0x10) write$FUSE_BMAP(r0, &(0x7f00000002c0)={0x18, 0xfffffffffffffffe, 0x1, {0x9}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x2, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:34 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000015e, 0x0) 23:20:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:35 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) socketpair(0xf, 0x6, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0x2a, 0x29, 0x1, {0x100000001, [{{0x8, 0x2, 0x3}, 0x3, 0xffffffffffffff81, 0x7, './file0'}]}}, 0x2a) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x335, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000100)) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000001c0)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000140)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:20:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4002000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000028c, 0x0) 23:20:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='-]!\x00', 0xffffffffffffff9c}, 0x10) write$FUSE_BMAP(r0, &(0x7f00000002c0)={0x18, 0xfffffffffffffffe, 0x1, {0x9}}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:35 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x182) chmod(&(0x7f0000000180)='./file0\x00', 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xf401000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:35 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000019a, 0x0) 23:20:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x6f9, 0x4) sendto$inet6(r0, &(0x7f0000000040)="d4f2bbdf3e898492a5684e60b6091ff31877fce95befa1142566a1604d828b0bcf5003b2", 0xe000, 0x4000, &(0x7f00000000c0)={0x2, 0x4e23}, 0xd5) 23:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x400300, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000163, 0x0) 23:20:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}, @vmwrite={0x8, 0x0, 0x19f32057, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x3400000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x17, 0x0, 0xfff}], 0x1) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xffffffff00000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:36 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nl=@unspec, &(0x7f0000000240)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x4, 0x30}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000780)={r1, @in6={{0xa, 0x4e23, 0xfffffffffffffffc, @remote, 0x39f}}, 0xcc, 0x3}, &(0x7f0000000840)=0x90) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r3 = getpgrp(0xffffffffffffffff) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000540)) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0xfffffffffffffffe, 0x5, {{0x3a41, 0x7ff, 0x1, r3}}}, 0x28) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc76e7de41cfb92d00727d7460802000000000000003cd713a412c4d0"]) read$FUSE(r4, &(0x7f00000030c0), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) accept(r4, &(0x7f00000004c0)=@in6, &(0x7f00000001c0)=0x80) read$FUSE(r4, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r4, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r4, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x20, 0x0, 0x100, 0x0, 0x0, 0x200, 0x0, 0x4000}}}, 0x78) 23:20:36 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000158, 0x0) 23:20:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x400000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000014f, 0x0) 23:20:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe803, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:36 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x881) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x3400000000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x1100, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x1f4, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000011f, 0x0) 23:20:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:37 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000085, 0x0) 23:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000018b, 0x0) 23:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe00, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000192, 0x0) 23:20:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000400)=""/107, &(0x7f00000001c0)=0x6b) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4002, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000014f, 0x0) 23:20:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xe, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000e, 0x0) 23:20:38 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x6, 0x4000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x5) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000002000), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xffffffffffffffff, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:20:38 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030307365725f69643dd373d4049978476df8c7b05823d8b6dac47ea659ad0213661c6b0cb27a511f347943060e1d4b9efe759ca5f310fdb176f078cc0d602070809e57a7c4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d3, 0x0) 23:20:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000e, 0x0) 23:20:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000130, 0x0) 23:20:38 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000e2, 0x0) 23:20:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(r1, 0x0) 23:20:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x7, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:38 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000811ea20e5b592f8ae4d9b923f68b3f8803495e6185691fa712423c131df781efbe15a6c41ea1552bc22c57760dcd0db8da3951e81a193f259ff9a99834f2e053f197f168c170acf6a8614de6632e9b7196a675f1ab227b72ea81429dda495d0c552cfbb6df89ec5682f9849e78cbbef8a220042899126c20a825046a1196001a66b1e33f371a52a379ed1eefaa9bb642396afd8ba3f679c97276dddb7272415693c39848ef7e9aafc740405b8b516329743fa1829f1794f471a9a46955a"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000251, 0x0) 23:20:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x40030000000000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000194, 0x0) 23:20:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) 23:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0xa00, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:39 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x20, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000078, 0x0) 23:20:39 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000138, 0x0) 23:20:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f2, 0x0) 23:20:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x400]}) 23:20:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x4000, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:39 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000d40)={@ipv4, 0x0}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000fc0)={@remote, @local, 0x0}, &(0x7f0000003000)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003080)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000004100)={@broadcast, @loopback, 0x0}, &(0x7f0000004140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004180)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000004280)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000400)=0x0) rt_sigqueueinfo(r13, 0x3, &(0x7f0000000480)={0x37, 0x80, 0x3, 0x100}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f00000043c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000004840)={&(0x7f0000004400)={0x410, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r4}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1b8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r10}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}]}}]}, 0x410}}, 0x4000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x2000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003, 0x0, [0x0, 0x0, 0x59]}) 23:20:39 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016a, 0x0) 23:20:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000021d, 0x0) 23:20:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="0f20e035000004000f22e0b9800000c00f3235000100000f300f01ca0fc7bcf00848000048b886550000000000000f23d80f21f835400000800f23f867660f38818e4a830000c4a2f9314c81eec44179176e00c442790ef4440f21d8", 0x5c}], 0x1, 0x0, &(0x7f0000000000), 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x90003}) 23:20:40 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_WRITE(r0, &(0x7f0000000100)={0x18, 0x0, 0x6, {0x5}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000028f, 0x0) 23:20:40 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001be, 0x0) 23:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3f00, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000d40)={@ipv4, 0x0}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000fc0)={@remote, @local, 0x0}, &(0x7f0000003000)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003080)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000004100)={@broadcast, @loopback, 0x0}, &(0x7f0000004140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004180)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000004280)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000400)=0x0) rt_sigqueueinfo(r13, 0x3, &(0x7f0000000480)={0x37, 0x80, 0x3, 0x100}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f00000043c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000004840)={&(0x7f0000004400)={0x410, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r4}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1b8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r10}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}]}}]}, 0x410}}, 0x4000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f2, 0x0) 23:20:40 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x0, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa00, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:40 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000013b, 0x0) 23:20:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000242, 0x0) 23:20:40 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000400)={r2, 0x20}, 0x8) 23:20:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3f00000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000028f, 0x0) 23:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa00000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:41 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000010f, 0x0) 23:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3400000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000205, 0x0) 23:20:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000d40)={@ipv4, 0x0}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000fc0)={@remote, @local, 0x0}, &(0x7f0000003000)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003080)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000004100)={@broadcast, @loopback, 0x0}, &(0x7f0000004140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004180)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000004280)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000400)=0x0) rt_sigqueueinfo(r13, 0x3, &(0x7f0000000480)={0x37, 0x80, 0x3, 0x100}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f00000043c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000004840)={&(0x7f0000004400)={0x410, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r4}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r5}, {0x1b8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r10}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}]}}]}, 0x410}}, 0x4000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xf401000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xf4010000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000af, 0x0) 23:20:41 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000254, 0x0) 23:20:41 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001fd, 0x0) 23:20:41 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4002000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:42 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i&m', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@loopback, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote, @in6=@loopback, 0x4e24, 0x3, 0x4e24, 0x2, 0x0, 0xa0, 0x20, 0xff, 0x0, r2}, {0xfffffffffffff800, 0x1, 0x3, 0x100000001, 0x81, 0x5, 0x5ab, 0x101}, {0x9, 0x3e80000000, 0x0, 0x8}, 0xffff, 0x6e6bb5, 0x1, 0x1, 0x2, 0x3}, {{@in=@local, 0x4d5, 0x33}, 0x2, @in, 0x3506, 0x0, 0x3, 0x9, 0x10000, 0x7, 0x2}}, 0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)={0x0, 0x68, "d2803116eb27260b3fd0f989951a190ee57fcd7966b7c96eb5aaa9d263607c41b0b3298b8d02e4a5bb28faf87f0441a2d474a93931b092aeda1d784193597ad58f8c5afbdd62440d5789addb12a8a69b5962ca85878711e80dc0bd6fc28fd7667d8bdede34de9eaf"}, &(0x7f00000001c0)=0x70) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000480)={r3, @in6={{0xa, 0x4e20, 0x2, @loopback, 0x6e67}}, 0xfff, 0xc0, 0x9, 0xe34, 0x61}, 0x98) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016f, 0x0) 23:20:42 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000018a, 0x0) 23:20:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xffffffff00000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3900592c6caf7abc8757b6ecc52bbc0db0f8f86a1c0d57635de768d4c86ab82922fd3f4380f67d1194fbb728bdb4c140a0d44c8412b2d06c9da69e7e59486a297621ed9f883decd19184ecff4d34e4d44ab168435b9499111c1c8c4cec6e9b78"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, 0x1}, 0xfffffffffffffd44) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x14280000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:42 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup\x00') ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000002c0)={0x80000001, 0x3, 0x5}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x11000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c2, 0x0) 23:20:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001d7, 0x0) 23:20:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x40000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = getuid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0xff}}]}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:42 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x100000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x40000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:43 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000006c, 0x0) 23:20:43 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB='4l,g`8id=', @ANYRESDEC=0x0, @ANYBLOB="052f089b4bbb930e301dc0064385c03a41caf61c2581cb33edef383392b977bf48d248b03b33d7f08e166416b6d2ee958cafc4f95a98b8aba81f823da2d67f56488bbf9ea614209f90f6aaa1d11e2415891c19bafc67ecd0f17a92570e4289c4ff2f87d926aa1d0c9f175a61a6633ad2beef85dfb84ac3e733a119d8ff8e1eeba5bf9404ffa2db52daa6cc9c4171defac616a351135caa22f2730b3e1cbb8b1a70d318831274b7ed6e0fb7245a"]) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000002c0)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) acct(&(0x7f0000000140)='./file0\x00') read$FUSE(r0, &(0x7f0000002000), 0x1000) write$UHID_INPUT(r1, &(0x7f00000009c0)={0x8, "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", 0x1000}, 0x1006) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) sendmsg$nl_xfrm(r0, &(0x7f0000000980)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000700)=@delpolicy={0x264, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {{@in=@broadcast, @in=@multicast1, 0x4e23, 0x2, 0x4e20, 0x3, 0xa, 0x20, 0x0, 0x87, r3, r2}, 0x0, 0x3}, [@lastused={0xc, 0xf, 0x3}, @extra_flags={0x8, 0x18, 0x80}, @extra_flags={0x8, 0x18, 0x4}, @replay_esn_val={0x38, 0x17, {0x7, 0x70bd29, 0x70bd2a, 0x70bd26, 0x70bd2a, 0x7, [0x2, 0x7f, 0x9, 0x0, 0x6, 0x0, 0xfaad]}}, @migrate={0x138, 0x11, [{@in6=@local, @in=@broadcast, 0x33, 0x2, 0x0, 0x3504, 0x0, 0xa}, {@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@remote, 0xff, 0x1, 0x0, 0x3502, 0xa, 0x2}, {@in, @in, 0xff, 0x4, 0x0, 0x3503, 0x2, 0xa}, {@in=@multicast2, @in6=@remote, 0x32, 0x7, 0x0, 0x3501, 0xa, 0x2}, {@in6, @in6=@ipv4={[], [], @rand_addr=0x8000}, 0x7e, 0x3, 0x0, 0x0, 0x2}, {@in, @in6=@local, 0x3b, 0x3, 0x0, 0x34ff, 0xa, 0x2}, {@in6=@mcast2, @in=@dev={0xac, 0x14, 0x14, 0x20}, 0x33, 0x2, 0x0, 0x0, 0xa, 0xa}]}, @lifetime_val={0x24, 0x9, {0xff, 0x7f, 0x2, 0x4}}, @etimer_thresh={0x8, 0xc, 0x1}, @replay_esn_val={0x30, 0x17, {0x5, 0x70bd28, 0x70bd28, 0x70bd29, 0x70bd27, 0xffff, [0x7, 0x5, 0x5, 0xcf6, 0x101]}}, @lifetime_val={0x24, 0x9, {0xf93, 0x7, 0x2, 0xe0}}, @extra_flags={0x8, 0x18, 0x1f}]}, 0x264}, 0x1, 0x0, 0x0, 0x80}, 0x880) 23:20:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ee, 0x0) 23:20:43 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000023e, 0x0) 23:20:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:43 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x80000, 0x0) getdents64(r0, &(0x7f0000000400)=""/183, 0xb7) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1, &(0x7f0000000dc0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f6486999be272653d30303030303030303030303030303030303034303230342c6e7365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f7597fe690100", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x34164c9a20b9bd98, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f00000001c0)) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000002000), 0x1165) pwritev(r0, &(0x7f0000000d40)=[{&(0x7f00000004c0)="88bd7ecf6aef51b1ae08f77e9a56d6697bcc15a282bd1235ad15d8ad2e24d9876eb78276894abeeb4bcfb7b356562b53d12f671b10f557325303c30c9034c038c38e5037808afb5443ca8605ab61cbc2185a1504ed85d87b8482b0d922caaaf06e12833a461749d1649c3c1a6d98a77d708b156711828d16add9315e33fb452c03e872a4209389d1816beddcbd5a3783971bbf176af50765075e44e99d314ea540bb9460a9a05d6a01564dc3e9f345c07cc26999", 0xb4}, {&(0x7f0000000580)="6cdee91a4d1d2d45de247fa634d701fe3c3f367d4d002da2a3c8b29dde213e963bd981", 0x23}, {&(0x7f00000005c0)="6e500654cadbd160a907c0fa35ad426e14393e5f45f054fd51b1ea32491858bfa498391f50076e6e8e43d6ef07c76faa76af93cbc6dd2eefd43d4a7d0cdd781f2548d216a088037b391f003bcbc97fe4677ff839199ec7b9bd255115855fedea25e79f5b1fef0628d191acea9d51738a726d3683ce7922163c43a535ea6eb6ca1816a75775b188e3752522ad218dcc79fb038731f96b2b8ba8a6ac051e9cf96b3bb1e307ec5db2a5a9f26cf1c6", 0xad}, {&(0x7f0000000b00)="8428e56fc31b01d81b3f99bf49e800541fc87160df480e70d23f1b18b535cd9b7930a1fdb416f90352edad1df64475440c960d8c70031d3390d9c57048298d7c12faa9d070c402320c74b9f53fb87d47a121499a87427c3a3615a8a42d0d0adc4c092c70755305e71f3f3c3f09f1dda698259775f28a367485eb3f9483fb4e58c2a5d4bba8d72263375c18583fcc88abac8a04abe85de5ac0d6b8a42c20c9c7f9c7907b8323c15bd783167a1bb9667c86a2c03201863dbe8bf07a64e", 0xbc}, {&(0x7f0000000bc0)="2278ae63c3ebc06b4d9dbda01a86ba6a546c98bebdfaeb0b8bf8f1802b9557e4f26534646fed10d242c62b663238575a37667aa71fdd0ea0b0eea114f3649851ee53adc192dc37d81bc4ceb69e499e44ca85c9155da6a786aa51109cca95148db2865acb293c23f8a22475bfc5f3933ab77d759bfa4bed23297d3e9905f6ee", 0x7f}, {&(0x7f0000000c40)="b15f792fb40ae18e329aa25c5286f502bedb45f5effd73ad75d62c0743c6c1236a245e7b801d1e5d3b52a10baf09346c4ec6e93b7b16b60e9948c8e099a90a472a6a8219dd356e4da00ddb0fac736d159b76efebb2df287d563a385b54987549d6abd92ca7739afac4cd4b01c61b440a4aeded805c830e0e75667ff162d769d9d5dda36b636509b7d83970f1d897b1d7e21c469ce23bc8dabc2b00770a8e82d9ffe2475189c1c93a7acc2fcaa8a1345d128b7d36868e99d6beff4b666d0421da1ccdfaa059f6ac676aacc76608eaf73ed8789461edfc26de44965f6389e6f0b755", 0xe1}], 0x6, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000700)={"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"}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0xc0000, 0x0) 23:20:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x400000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:20:43 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="95bf5bc92b8e307b6db9c0e4d7d0e57f67e6ef9210b96187f5e6d6dd1e4f53c1770f8ae152a1dd7ad34b58d600ea279620c0", 0x32}, {&(0x7f0000002000)="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", 0x1000}], 0x2, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) fcntl$setsig(r1, 0xa, 0x41) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe803000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000400)=0x10) 23:20:43 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="95bf5bc92b8e307b6db9c0e4d7d0e57f67e6ef9210b96187f5e6d6dd1e4f53c1770f8ae152a1dd7ad34b58d600ea279620c0", 0x32}, {&(0x7f0000002000)="e25a89caf42e9b0c15bdeaf8f473b3e9f0d531d975f02fd3262156531a5ef5af88f52eb5a2befb53b51072fb75185dee9c7e3dc4790575d4e60a9988f10245ba5e2c11194359b6d6162d8689e7f339e7a67547e657718db53eb4f98b923668c2a3564eef67ec22046be94449d11ab9bdd19427715215ff880d70ed3b3b7f225949c39ce5b1e51ef33b5d5013b53136ec00199a40b9e899e472e879e10e5e8354f49aaceccbd33acd4d8781d8985631ccf647f1c91949de5c03de010f80ee940ebd2c62eb7ad6ad91e3cf7b9c44675d3eb5505b657f0600dfdd4e700e5cd2e2536b5004ef41604dfb9c5545817ab3d313bb8df7fa8cecd531bed0afcdf12c196b70853c7fd626d24ed9bfc56d8b0fbece245731b6d237f45c3080e149747591d2472c27d3e525fa643f74e73f8e9574abbe223ef7953b68069be07af415534ecc3b3d8c18d32579e2ea82808974a3e26d37b4664a7498f12b20edd85fb68f67d4e16a4393e81d8dd2c088a1e60beeba76d119bccee1cac48cdd41c7e8b53480c375aacd98622badb15ff08d34d81ebbeb3306ef9d5cbb73a0cd3b3f98643ef200267be6ca0b628ace418474f71895ed1c2ab29af75238d75ba86a557b79f24cde3460f4b8302234d59bdc5795706deabbed01c3c14e03bc9e4939c7b2e724dc7ee775deaea77f8583245aeee181dd85b6d4f1e99fd1b3766f02cdcebea4a6f92d6270b3dc40970260850cbdc02b28cd80ffa561c98e24401b0060a68623431abd1aee0ca2a22462bc7273b37708cf3ebd6177a7948da50ad23525f44f267e2884651fa934dd6c198655eea2f1039f35a06e19b75f642bfb79cc1218a04ad01bc4c8c17e5a780fa507e80be5ccd36a7957aa1344b98417f1b3f317dbbb44019e426cffce5f8ddc1d799c4f3d3c0112221c42b26e469dd8ff93bbf9787e361ed81917451f32f612928acd53c4278b9e2599756e613d3b9918c8823b10062d8157907379a202e4753c4344edb3269632af1e735cd246ce2faa41458918931592c7347f8ae674a66cf7f8fb9a4c7ce31e11dd9882b698974163f86c9d3bfd3f0432795180deb4720c81c3f783a56614d673ef75543acd251ef4053f861b3daec0378aad6190db9f3cb623ea7cfceaee8082cf0e75538ca9a304400be2820f49ea23aa0d6567e8f5dba1a6277ba76e02fa92e3125c1a3520b29dd85604bc931d1c0aa526aa998e863679d438917fa3b0099f3f1cfa7750916d6cd587ca545941653cc083d1e729de7e7c3128db576a51b9ad5c65abf6639af5e2b859164452904fde5e59ceca416c16bae9153c83ed21188b10ce7d9093cbe83db278a6b27ab6f2730704b902495bc96cd85023211cf5e7f829a9304783cca8011a840cd5685b16f624c841f435727ce10a31d2bdf1b1d17efb3a6e2743301a0dc4333b32b1bbd61e38587f4cc2fb210fa47ce09453922d215c2ceb7831ec4a67292e4cff1e5861b4a750690c6aef59f490e2971c8bab987b248c7022dede5cda005db12ee40fcbff6945ec24fb0b2f26289bf9c303edcea0f79cf604399c6c4aa373f5394c15fb27f554c6385acd221323e414c5e8bbea9d094a877427b2c6527935df18a3e6cac6b92e299d1a75f42ade493a415c2980229d382b6674cfe951b1571c2a7de9793e127c0edfd4d0b37c38a7fb0747f1c5f04d77112e2f6d679086fc2edccebd3cdd54d14cd808a370f026be5d7386e42f491e1b487286604c7d5fef2cdf661e932a6428788fd55fe9219d6ac148d77b7d3238d63687910d72109c04aa51f30f8aeb954159a11e55c2a5da17f762bd50e16f94a6b9bc885c13e991df8de7c2d5eabe94d5ceed5ca6298dac16e1739551087f270323b0db9a999b3a19fa2a321e73ccfbae73e5c94bd554d59aa92e120320a898ecfb85bb3c6e2793c5d6f703081f48f1787aaa77451d304126195b4e2288eb9d498e935e79c12853aaff5273a9f2754b6bda62146369ea3df531c907236999d42e81b546be793435c1cb4a8a464c2a2f029f145c4f7090782cfe8b2c777b5d516f964400876d8cd23d648e2564fc6a16f8109fb465e63cc9187cd18dd75c7cf94e489d6a76104577f012b7b4ec21f0cdef02715105dd7da53a46973120cbf08f101fdb2aca42a27ab4ae13d8265adc8c07a178f4a8c85c26d88797730b9a9ab912d1ed6c0793751d81ca7219b0c4e9734da9021751c8eb3ab501a9dca9cd1368c51d51ba04a84411b8ec4aceab482c4768f85823577ba3cc0dd6ebdc039c6e0769d5b615e4589a8811cc5ae9e82258001738be80dd4c13a4735a2a8930297b75ddf0ab97c1ac475e8e2538b4b0d6303b0656f882b86e510aeac78bfe0c251601bb8eb941703e6947ef2416d8d323d3dec1537dc075e4a1d02f85cf3759e743c62607d9b0c99913046d664aa0289f70b217a7f111239a9170e7024d4a100206b59e6c38527ab86071a8311fb8579e16aa22ec62125ea0ef8eb2316fe0350ebe29f85677413a568ed4c264c380aa5ede6c9eeff3abde467a4a76bcf6059d17a7539d35d0e55c394f5854b55654b0e9ef6b06ebd990dcf7b9337bf4505748fae205bbbf306364cf28da679568c770d4313be054f2b1a42545aed301c3c54cde80037ef08966956817a7775ec9fb67ef32af600af40bd88a33b17f738aabcb58b6ffbad3c11a94c7def3315a1cff73efbe5143cb4c52c14e585d4001ba8abc2ffe345eb731921c53a86a0514f9aa71d920c575a1570517c51403f01d3719f97bbbbfda470eba2f9d7867a62688d756a2d9bc40d17e1ecef9db3a1dc9b46d28133cb940aa066bd34bed3b703976f63c854d719000809cbb65f556a372394321f172452cd833218c93d6b05afcbcb62c5f3ec1c90db3c6b1cbcebad34e913bfc08af4d03e2ef7b196a19b8ae05e15a02082e9f643dea36cc980268d425422eb12ce23eb4a35550a0226fa94632a93d7939c7d1072d113541e1746321fec688936164415bbc7fbdf346a0f95de7daea20286a88a5f7e4322ef18ef02f0ed1d59602a844814d77fb9e4da8b47bf28c3b6fb4cb03a9bdeb13e27f0194f5db37c6cc8657836e958551fa0660114a8acf66d2e977672cb7da890dc020b541f0f1fd47e0e0899b2bb73c5db14d25d04b07203b517cd2f898c8ec064342ebc2d1afb901d217b7acec693fca1658695f567d6544594e4310392dbed92456d802fb38821b538709ff4942f1da25ace47ab94a0c66f4d03498aa99a8062d6305352a33169d702564c8a2be7c60c5cf3c211eeeb9da6dbac6f5f4f31216abda00bafb4ff15c08bdcc0b9c9065ef2c0aab9af3de9accc7d7052a17b6b3f08fb121dab512de4b3762c0287f6f4c8ccfb637c8e57f71e772cd02314f685d046e9017b553ec7701c77c08be75dd416b7e49e2a5866381be856daf305ade53f2578123a8cc4ad53551b987c3d92150e20b5a68295da2a79bfec237d86146297640b533120d501b4453ecf658b61d6ff1256897140aeb58ec799041948f378fc69162cd995af6d278f15136a6b9b25cb3e5367345ded123a8c0245a83f93e2a8d2374986a1ae03a94428dacfa41cc4912818f5bedfca5aa5c3b19fcaa574e5ab6ee289c02b2d2448721b3ab7ba764c8467e950a2cbe018ab8772c663646c08d763cffed05d68b17cc1727fb71fc5fc75e03e74a3a31f18c77a97a4dcd8c394ccae482ad1dd336ff8b3f0d04dd5d384247c7400b1d976b3f3d8af92bcedb4520175b8a898659207b7a96c0d1e421ca82c71e273f1c97aeee802f66e045a8aca9d96de61d08e7b415aea1c3225385ab7f766201c7565209c30efd23c1b5d40f6232576e7c67f0e63608ff401ef3571f3a701739121aecf77043afdb91ed3de84c607f1598a6e6e0825a95be118f0b8bd5dd6e46dec02595658744f5faf392cc95dcb4792c4f7ca59ea9ff4393f0084a3930ed35be223981b2230caaba64d5cada093337d04cdef9ed8a3dc5b4286293ac0c0314f9e809d20e9604f4ab4343936b0c886957dcdc77035dcf2ed9539f858ba3cea55f43833bcf711b5b37359fbb39ebb4dce94672b40de0ffb37a970f7d137176c9fd6668df9df35c73a5af77063e70aacd753651ad09af63efc1cd8c58a6e6e698aba77413fbe9345db5c5d834e02da21fe23b6c890af73dfc727dd50d9bd5e3188011e68281dd86a6ed3a09389c0f2783db7c693055fb71be4b4024219b31e88f3661e661cda8d601726d5cb423a9012eef660664f938c0b79907cb7e53caaa62bb1e09679f07c844ee6c6e5f7e2d5f92efaa0afbcbb640ccb9d415e2afa0371da289f224409d6c371cf43732c179e52147cc7355c605100202708145bcff72cb4cdb3837e6661b7e5a445ff25a3d6fd1ad54dedc4b00e73a9a65f69f465042fcaf36adff20c3812ab1d392c913ae1766107a23becf12fec8567801e9cdba7b0fc9e6ec1d1048f9fb5dd1e56a34029a13cbb039ac67bea707ee4c133f4cbc05b5f93437dc6580dbca25088e19cee2e5d49d81338ce0121030cfb2259f92e414ed59132df800b4718bc9ffb621d8805891365348e50dc0ea8b844b724c80635033a172e7a86ddff49c8c27864538f7bc7215908161db6368a7e69338de7c42d0404b8714f5e4299fa1fd42b47457c1b1c86aa3d21e1640caeb987317edd5e02e26e841b4ce09c8d902818ee37714060eb3849270282d40de8a2b731471a3d8b3f83b34c4e49975e1a1f03f58cda53c150a7132bcba927c242c0d65d035d0c8834d91d3ea436390f5e22e2d328b7cfbca6f4b2bdb4ca82007141aba1dcbfa01e3d5894afbd6e1dbbcb82c2b43dbf301f24c5ba7dfd9a74d0eae24c0659276371693fbd58247426bb3534a32df7f4bd5255c91d5ac3b3934afb51dc48e19bd9c88451721bc03fdfb6e47656e6d5e8b47c0fe33ccc73ad9ff67eb22d97dca934e4956f79e33e5d969338f3afb51b1bc2a30c669f320f057d1ceb66a187f2c2b1f8f671a8aa37d4b10c11e6dbfc7180b1e61b27cb7101fec2225111ed3504f4a3bda31d9502553fb9ce7b825a1acb3fdfd640aa3517109c97a862542a5af7fa9fd9545146af43dd0034250f78728381ba407a35e4299bd1c592d7ba8bbbdac98509ed0287a9a5bc15bc013987cc54e622f5a72f89bceb5faa45cafb64410e12cb3196cf93d501ce91457230951eddf44e0222ba2fc9fc1dcf1debf29ad7000db65cc3f2893dfc540c2cc68f283b2bfd0e508c3e7d9b1ce472aa64eb841d226d08ed1d5933fd5ccfeba5e6188b08ea2c8d40398bf3bdf8c15fcc3c4c067583b19075689e41fe9d883d2fbc5bd0843b1cd2d611506314b9ba4817122dc4e3b9e6dc2e02afaa1cf8571339cf3bff8324e0e11f32de94d1684905b4190d0935e5afd200bbbc6a9b011d45eaeef11d5f528d0a3cc108522363214e5286b0397ee2c174d31067d8af9dfe8be17134cc8eae7766570aad596ccd0a139ab29e32f65a47aebe5522a73377ee7bbfa2bbd5c30156d4a180873fb99b09b8c465986b0699b2e915543b4ac6ad87ed4a6dd3d9abb25e73a669dff69667d5dc79f83971dc390b7f8d85e6066e13837bd93cefe817b163cf06f3d71e44d714165efdacec2b8828753329996d11d155e3d0cd57beacc4e219afd1c006f8b7ded06cf791ba67b88a3acaa8ce2bb11c168d2b5efef04424b3c0c54b231c4f9912591802086229abae8e3c05dea89798d0657d4bc55bccd8773931f71ffa6dc08b920e8bab74d11efea96560a4ea550147ffea3a6ff", 0x1000}], 0x2, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) fcntl$setsig(r1, 0xa, 0x41) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) gettid() write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:44 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x9b67, 0x2040) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x6, @local, 0x5}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x21c6310c, 0x8}, 0x8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x40030000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:44 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000012f, 0x0) 23:20:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000161, 0x0) 23:20:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0), &(0x7f0000000400)=0x10) 23:20:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x700, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x7, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016d, 0x0) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x9, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:44 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c5, 0x0) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1100000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000225, 0x0) 23:20:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x142800, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:45 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x284000, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66643d11fdae61562b35658718b9baecc3198bccf8013a07f65a508b7592452ad9ca0985c069c6d74c89827deeb34692de9d60051eb0084c7c46108a3954f1f973a338e26a9ff1a7a8379c57c1b7ada88dfd27e29d154568b2b0d473dbc31881706a46efdac4ed2f15452d32661143c2640e57780cf1f847025e7265675b0c0207d90c3f6db5d82efff6fa54ac910e6b52b0a2f4b66d37720d3cc922ed", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x20001, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000400)={r2, 0xa6}, 0xfffffffffffffec2) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) socket$inet6(0xa, 0x6, 0x2) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1000000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000da, 0x0) 23:20:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000143, 0x0) 23:20:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x142800, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x40000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000a2, 0x0) 23:20:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x8055, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0xffffffffffffff1d) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000014, 0x0) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3400, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000156, 0x0) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4002, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000137, 0x0) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x799e0300, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000048, 0x0) 23:20:45 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b5, 0x0) 23:20:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x10000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x34000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4002, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4000000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$dupfd(r0, 0x0, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000006e, 0x0) 23:20:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000137, 0x0) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe00000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000284, 0x0) 23:20:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000fc, 0x0) 23:20:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x34000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe00000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c6, 0x0) 23:20:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a2, 0x0) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x34000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1f4, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0xffffffffffffff1d) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:47 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = shmget$private(0x0, 0x4000, 0x1002, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x2100) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x9000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4002, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b9, 0x0) 23:20:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001da, 0x0) 23:20:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$dupfd(r0, 0x0, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xf401, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @loopback}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000580)={&(0x7f0000000700)=@delpolicy={0x1ac, 0x14, 0x204, 0x70bd25, 0x25dfdbff, {{@in=@multicast1, @in=@broadcast, 0x4e24, 0x0, 0x4e20, 0x3, 0x2, 0x20, 0x20, 0x2d, r2, r3}, 0x6e6bc0, 0x1}, [@srcaddr={0x14, 0xd, @in6=@loopback}, @srcaddr={0x14, 0xd, @in=@loopback}, @ipv4_hthresh={0x8, 0x3, {0x1e, 0x6}}, @lastused={0xc, 0xf, 0x5cd}, @tmpl={0x104, 0x5, [{{@in=@loopback, 0x4d3, 0x32}, 0xa, @in=@rand_addr=0x3ff, 0x3502, 0x7, 0x3, 0x26, 0x4, 0x8, 0xffffffff}, {{@in6, 0x4d5}, 0xa, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x34ff, 0x7, 0x0, 0xfff, 0x8, 0x7, 0xffffffffffffff82}, {{@in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4d4, 0x2b}, 0x0, @in=@remote, 0x0, 0x4, 0x1, 0x9, 0x6, 0x3, 0x3}, {{@in=@rand_addr=0x3, 0x4d3, 0x33}, 0xa, @in=@rand_addr=0x3f, 0x3504, 0x3, 0x3, 0x101, 0x5, 0x2, 0x5}]}, @srcaddr={0x14, 0xd, @in6=@remote}, @output_mark={0x8, 0x1d, 0xaa}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bind$unix(r4, &(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r4) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={{r7, r8/1000+10000}}, 0x0) 23:20:47 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000021d, 0x0) 23:20:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000134, 0x0) 23:20:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x7000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:47 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x7, 0x80000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3e8, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x10, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000260, 0x0) 23:20:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000e3, 0x0) 23:20:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe8030000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1100, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000026f, 0x0) 23:20:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="bd583d222cf98aeb070266590af4b7c050677d51508e43e71d37e80d19249ea9e021dbabdb1b591e2a8c5cff054b4f867c3f612a1505e18a8824747200d461e00659ca0a15e6715df8f6e018466a7d8896ef176dce63ea41d95f797f966d6e4f03f1e8f55c06ea88af7d74042222860b1c2f9c48ba872c7c779d38a53699c1679730058bc96b915ef65453101c60969987d629872df3577705ec806edb64a19e28c738f315e327ef93c4694ac479c494e46fb2e7400992dec427529643514f7b962fff6d97d44ea8badea0488a6acc9640d7500623fb4e8e96a88bb92db6facf09631ff3f0344429d84ba81d084a6a778f9355932a5258230662c07618a84b4e87d8d126ffe5586a226c02f15057a4c7cfd44cdea4f60019842659812ee7663fa00fc69d9983b6d919a465fc2fc402f79d2510caa0642819639bc1f8a7813adf618f400d67cd3cd32e3591db1fe08247a309515c6d752ca0623471103f13262c5daa3129aac3fa427275d7fc45df4050b1570fd6b3f345c743d69d1dd76b95a9951865cc4d2d02ecc32a5aeb46686a16cfa3e9c3233567d99a2ed2081b8d2876b054d635935ecdd70e487f2de295e4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000fc, 0x0) 23:20:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000b4, 0x0) 23:20:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000026f, 0x0) 23:20:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x700000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000119, 0x0) 23:20:48 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000780)='/dev/full\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000c80)={0x13, 0xb, 0xfa00, {&(0x7f00000007c0), r1, 0x3}}, 0xfe27) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0066df343f4df1a3d673f319cca711f22381a97d23316a1d82fa45a76b9d7908d3d635147b965cf370895b82cb4e086d49bb9a67e5785fa7e2052c9c1fb8faa2f199080d6debfd640a1c290c0c18be1923e280494353096d749510294863c2d9bde5e3c9d0f974458efb6c326b0db11765ad9783b5b8b102c2dc5570966e00000000"]) read$FUSE(r2, &(0x7f00000030c0), 0x1000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000240)={0x2}) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r4 = dup2(r2, r2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x200}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000700)=@assoc_value={r6, 0x800000000000000}, &(0x7f0000000740)=0x8) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x7c, r5, 0x120, 0x70bd2c, 0xcc9, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) read$FUSE(r2, &(0x7f0000002000), 0xfe55) sendfile(r0, r4, &(0x7f0000000bc0), 0x8) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) io_setup(0x441ff4b2, &(0x7f0000000a80)=0x0) clock_gettime(0x0, &(0x7f0000000b40)={0x0, 0x0}) io_getevents(r7, 0x5, 0x3, &(0x7f0000000ac0)=[{}, {}, {}], &(0x7f0000000b80)={r8, r9+10000000}) write$FUSE_ATTR(r2, &(0x7f0000000680)={0xffffffffffffffd5, 0x0, 0x4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000c00)=@assoc_value={r6, 0x7}, &(0x7f0000000c40)=0x8) 23:20:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe00, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x4000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000010d, 0x0) 23:20:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000cf, 0x0) 23:20:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3f000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:49 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b4, 0x0) 23:20:49 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x240, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 2: 23:20:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x39e79, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:50 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000118, 0x0) 23:20:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000255, 0x0) 23:20:50 executing program 2: 23:20:50 executing program 2: 23:20:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:50 executing program 1: 23:20:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) socket$inet_smc(0x2b, 0x1, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8, 0x40) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x2) 23:20:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x80550000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x240, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 23:20:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000023d, 0x0) 23:20:51 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x400000) ioctl$TIOCNXCL(r1, 0x540d) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0x349) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x2, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x200000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa05ffff, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:51 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000157, 0x0) 23:20:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001dd, 0x0) 23:20:52 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f00000002c0)='./file0\x00', 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0xffffffffffffffff, 0x5, {0x6, 0x0, 0x8, 0xffffffff7fffffff, 0x9, 0x1, {0x5, 0x7, 0xffffffffffff3154, 0x1, 0x5, 0x5, 0x6, 0x5, 0x1, 0x2, 0x1f, r1, r2, 0x8, 0x200}}}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000e4, 0x0) 23:20:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000052, 0x0) 23:20:52 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000026, 0x0) 23:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xffff050a, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001fb, 0x0) 23:20:52 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016d, 0x0) 23:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x5580, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000a3, 0x0) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xa05ffff00000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000440)=""/39, 0x27) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000400)=0x5) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) pkey_alloc(0x0, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xec, 0x501002) write$eventfd(r2, &(0x7f00000001c0)=0x7fffffff, 0x8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000166, 0x0) 23:20:53 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000019c, 0x0) 23:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000400)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000480)="34f29e6ac6ae46f04b72a70a22ec7cdc6aac543a38b7903a054f87bca9a8a7a1f1097f12e47a31c3b1884d2f4fcfa1f5040168057966a1db0731b06ddf0c83cb72b8a52d3587e0f4e2c13e4c671a6d55a4048c22312405021a918ea58516dd18270fc8da3f7afd1a569f735e3598fc8def39cff89ab0c8b04328c2d6ddf11f7175d8d4fc33e0d090fd4e59db2ac6ac9f5b4bb0cb8af23f37a012405be9bda43ad581ab0b723e68db9807228ebb25bd086ed5f08dbc0c9a0aff485fa4aaffd57be25c0eef8e6bdc27949c3c19460665ed813754bf4d07e01bc6befde050833f6a5d", 0xe1}], 0x1, &(0x7f0000000700)=[{0x58, 0x0, 0x8d, "729a4baa050c3494e17812d6ec7622943f9ce7b37016237dc974ac3b9aebf17bc5804b3b60f61acc1e6bce3a98a29c188f1df46129cca4654a2a70baa91b17d57a14d2ee4ccf"}, {0xf8, 0x10d, 0x80, "64a21062f11bc949b36e244dc6b2b00cde4841f37aaa3b54b7fdddb9d62f99d858cbdbf62878dc57fe21182e1cd999fc3d50a0c5e6fe1db00635694f48fc99b47fed28a6a6914f10735c957e31c104528125f0d78879645694a298eec40f20986c27aa855b886fd1118d8219e05d01398ddc6faf09e3e4a850f3238c26f6b09b2fc3980ebbfd343ed518025b5ead075276fa968182c4c76d13b44f01a59e31bbc1aadfb632788f6a2352ba41386bfd29f0e2716114e2a4c9dd11a61f791e1a8c2378be392e2e89789c625721ec3d8b46606b968839a5ba6eaa1640d5e28d40d8f4b0"}, {0x18, 0x108, 0xb65, "14f8"}, {0x88, 0x0, 0x7, "2c97bc816ba27799a7f7364d2ece4c6b5b66122bb7678733e54d99101ebef3233a71a75044c69140d1e7abba29f02b9f2aa5e7dcc3ab7642041f162edf09175c4da9d4d7c5813bed46cfb3aa612fe1618f82999e189e8fb881552e1f0c332a17a40d035d3e44cfc439ca1d0c0f5a593856e1e4"}, {0xa0, 0x3a, 0x100000001, "72eca21b289ff73a19619ca449ef84e1fffff06681c2bef33e8a689290a86bc6e582fddad9394fcc78c84fce92b56295576a610e2b2b6c4ad0160c5aaa4024b7c60b3693152bf51037fe718d7dd4534a8062e43435da9fdb23faf8684bf53bc99378e5c2fbcbec120729bc798517a482e2034652591be9f22d592b04ccb13cfba39f9d1836e49a417f56f54c30"}, {0x80, 0x11f, 0x7fff, "e10f465e4248dd34c0f7036fe75564bd8de732a05ed55c99cc0946dd7c31ddc586475bf9d9c34884f453c96aa42eecba9329348716f7c4ecad3f950ddc939f6c2b236bef98b42cf29afa0231c9e3474ae956e6993bf1d3b50e4a2218062d45c8486412561610b714efb7d5"}, {0xa8, 0x0, 0x6, "04d1380238f3776a01628b480c34e734683faf7e5b73732bb30e3922f87c3942177c0c9a3da24e9db826570c19b92afa034fd23a4c05b6f8c092b532b0f6c9538d4f73722d2f9d146e219661b8fc9b7385715a2c8b3a0ae7920624492a799fac7b4020a9d33e8901bf3efc49de1295965247f8f74ca4b4d738e1374441a71ef659df50a2e2c43261c8576113ab5c199d48fc8bda"}], 0x3b8, 0x4000080}, 0x40000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000c00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$P9_RSETATTR(r0, &(0x7f0000000580)={0x7, 0x1b, 0x1}, 0x7) recvfrom$unix(r0, &(0x7f00000005c0)=""/23, 0x17, 0x3, &(0x7f0000000600)=@file={0x0, './file0/file0\x00'}, 0x6e) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x40020000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000228, 0x0) 23:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x900, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xe803, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x11, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000d0, 0x0) 23:20:53 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000026b, 0x0) 23:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x34, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000014c, 0x0) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xffffffffffffffff, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000440)=""/39, 0x27) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000400)=0x5) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) pkey_alloc(0x0, 0x1) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xec, 0x501002) write$eventfd(r2, &(0x7f00000001c0)=0x7fffffff, 0x8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:54 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x80000, 0x0) getpeername$unix(r1, &(0x7f0000000400)=@abs, &(0x7f00000001c0)=0x6e) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000221, 0x0) 23:20:54 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000227, 0x0) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x281400, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000400)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000480)="34f29e6ac6ae46f04b72a70a22ec7cdc6aac543a38b7903a054f87bca9a8a7a1f1097f12e47a31c3b1884d2f4fcfa1f5040168057966a1db0731b06ddf0c83cb72b8a52d3587e0f4e2c13e4c671a6d55a4048c22312405021a918ea58516dd18270fc8da3f7afd1a569f735e3598fc8def39cff89ab0c8b04328c2d6ddf11f7175d8d4fc33e0d090fd4e59db2ac6ac9f5b4bb0cb8af23f37a012405be9bda43ad581ab0b723e68db9807228ebb25bd086ed5f08dbc0c9a0aff485fa4aaffd57be25c0eef8e6bdc27949c3c19460665ed813754bf4d07e01bc6befde050833f6a5d", 0xe1}], 0x1, &(0x7f0000000700)=[{0x58, 0x0, 0x8d, "729a4baa050c3494e17812d6ec7622943f9ce7b37016237dc974ac3b9aebf17bc5804b3b60f61acc1e6bce3a98a29c188f1df46129cca4654a2a70baa91b17d57a14d2ee4ccf"}, {0xf8, 0x10d, 0x80, "64a21062f11bc949b36e244dc6b2b00cde4841f37aaa3b54b7fdddb9d62f99d858cbdbf62878dc57fe21182e1cd999fc3d50a0c5e6fe1db00635694f48fc99b47fed28a6a6914f10735c957e31c104528125f0d78879645694a298eec40f20986c27aa855b886fd1118d8219e05d01398ddc6faf09e3e4a850f3238c26f6b09b2fc3980ebbfd343ed518025b5ead075276fa968182c4c76d13b44f01a59e31bbc1aadfb632788f6a2352ba41386bfd29f0e2716114e2a4c9dd11a61f791e1a8c2378be392e2e89789c625721ec3d8b46606b968839a5ba6eaa1640d5e28d40d8f4b0"}, {0x18, 0x108, 0xb65, "14f8"}, {0x88, 0x0, 0x7, "2c97bc816ba27799a7f7364d2ece4c6b5b66122bb7678733e54d99101ebef3233a71a75044c69140d1e7abba29f02b9f2aa5e7dcc3ab7642041f162edf09175c4da9d4d7c5813bed46cfb3aa612fe1618f82999e189e8fb881552e1f0c332a17a40d035d3e44cfc439ca1d0c0f5a593856e1e4"}, {0xa0, 0x3a, 0x100000001, "72eca21b289ff73a19619ca449ef84e1fffff06681c2bef33e8a689290a86bc6e582fddad9394fcc78c84fce92b56295576a610e2b2b6c4ad0160c5aaa4024b7c60b3693152bf51037fe718d7dd4534a8062e43435da9fdb23faf8684bf53bc99378e5c2fbcbec120729bc798517a482e2034652591be9f22d592b04ccb13cfba39f9d1836e49a417f56f54c30"}, {0x80, 0x11f, 0x7fff, "e10f465e4248dd34c0f7036fe75564bd8de732a05ed55c99cc0946dd7c31ddc586475bf9d9c34884f453c96aa42eecba9329348716f7c4ecad3f950ddc939f6c2b236bef98b42cf29afa0231c9e3474ae956e6993bf1d3b50e4a2218062d45c8486412561610b714efb7d5"}, {0xa8, 0x0, 0x6, "04d1380238f3776a01628b480c34e734683faf7e5b73732bb30e3922f87c3942177c0c9a3da24e9db826570c19b92afa034fd23a4c05b6f8c092b532b0f6c9538d4f73722d2f9d146e219661b8fc9b7385715a2c8b3a0ae7920624492a799fac7b4020a9d33e8901bf3efc49de1295965247f8f74ca4b4d738e1374441a71ef659df50a2e2c43261c8576113ab5c199d48fc8bda"}], 0x3b8, 0x4000080}, 0x40000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000c00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$P9_RSETATTR(r0, &(0x7f0000000580)={0x7, 0x1b, 0x1}, 0x7) recvfrom$unix(r0, &(0x7f00000005c0)=""/23, 0x17, 0x3, &(0x7f0000000600)=@file={0x0, './file0/file0\x00'}, 0x6e) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xffffff7f, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x400300, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:54 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001d1, 0x0) 23:20:54 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0xffffff7f00000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000158, 0x0) 23:20:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x8055000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000218, 0x0) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x799e030000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:55 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) futex(&(0x7f00000002c0)=0x2, 0x4, 0x0, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)=0x1, 0x2) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000480)={0xd0, 0x0, 0x1, [{0x5, 0x4, 0x4, 0x8001, 'ppp1'}, {0x6, 0x389, 0x0, 0x8}, {0x0, 0xb8, 0x11, 0x8, '))vboxnet1-vmnet1'}, {0x2, 0x80000001, 0x6, 0x5, '-(eth0'}, {0x5, 0x100000001, 0x8, 0x0, 'ppp1bdev'}, {0x5, 0x20, 0x0, 0x43a00}]}, 0xd0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f00000001c0)={0xfffffffffffffec8, 0x2, 0x1}, 0xfffffffffffffef9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x900000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000019b, 0x0) 23:20:55 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000014f, 0x0) 23:20:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000400)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000480)="34f29e6ac6ae46f04b72a70a22ec7cdc6aac543a38b7903a054f87bca9a8a7a1f1097f12e47a31c3b1884d2f4fcfa1f5040168057966a1db0731b06ddf0c83cb72b8a52d3587e0f4e2c13e4c671a6d55a4048c22312405021a918ea58516dd18270fc8da3f7afd1a569f735e3598fc8def39cff89ab0c8b04328c2d6ddf11f7175d8d4fc33e0d090fd4e59db2ac6ac9f5b4bb0cb8af23f37a012405be9bda43ad581ab0b723e68db9807228ebb25bd086ed5f08dbc0c9a0aff485fa4aaffd57be25c0eef8e6bdc27949c3c19460665ed813754bf4d07e01bc6befde050833f6a5d", 0xe1}], 0x1, &(0x7f0000000700)=[{0x58, 0x0, 0x8d, "729a4baa050c3494e17812d6ec7622943f9ce7b37016237dc974ac3b9aebf17bc5804b3b60f61acc1e6bce3a98a29c188f1df46129cca4654a2a70baa91b17d57a14d2ee4ccf"}, {0xf8, 0x10d, 0x80, "64a21062f11bc949b36e244dc6b2b00cde4841f37aaa3b54b7fdddb9d62f99d858cbdbf62878dc57fe21182e1cd999fc3d50a0c5e6fe1db00635694f48fc99b47fed28a6a6914f10735c957e31c104528125f0d78879645694a298eec40f20986c27aa855b886fd1118d8219e05d01398ddc6faf09e3e4a850f3238c26f6b09b2fc3980ebbfd343ed518025b5ead075276fa968182c4c76d13b44f01a59e31bbc1aadfb632788f6a2352ba41386bfd29f0e2716114e2a4c9dd11a61f791e1a8c2378be392e2e89789c625721ec3d8b46606b968839a5ba6eaa1640d5e28d40d8f4b0"}, {0x18, 0x108, 0xb65, "14f8"}, {0x88, 0x0, 0x7, "2c97bc816ba27799a7f7364d2ece4c6b5b66122bb7678733e54d99101ebef3233a71a75044c69140d1e7abba29f02b9f2aa5e7dcc3ab7642041f162edf09175c4da9d4d7c5813bed46cfb3aa612fe1618f82999e189e8fb881552e1f0c332a17a40d035d3e44cfc439ca1d0c0f5a593856e1e4"}, {0xa0, 0x3a, 0x100000001, "72eca21b289ff73a19619ca449ef84e1fffff06681c2bef33e8a689290a86bc6e582fddad9394fcc78c84fce92b56295576a610e2b2b6c4ad0160c5aaa4024b7c60b3693152bf51037fe718d7dd4534a8062e43435da9fdb23faf8684bf53bc99378e5c2fbcbec120729bc798517a482e2034652591be9f22d592b04ccb13cfba39f9d1836e49a417f56f54c30"}, {0x80, 0x11f, 0x7fff, "e10f465e4248dd34c0f7036fe75564bd8de732a05ed55c99cc0946dd7c31ddc586475bf9d9c34884f453c96aa42eecba9329348716f7c4ecad3f950ddc939f6c2b236bef98b42cf29afa0231c9e3474ae956e6993bf1d3b50e4a2218062d45c8486412561610b714efb7d5"}, {0xa8, 0x0, 0x6, "04d1380238f3776a01628b480c34e734683faf7e5b73732bb30e3922f87c3942177c0c9a3da24e9db826570c19b92afa034fd23a4c05b6f8c092b532b0f6c9538d4f73722d2f9d146e219661b8fc9b7385715a2c8b3a0ae7920624492a799fac7b4020a9d33e8901bf3efc49de1295965247f8f74ca4b4d738e1374441a71ef659df50a2e2c43261c8576113ab5c199d48fc8bda"}], 0x3b8, 0x4000080}, 0x40000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000c00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$P9_RSETATTR(r0, &(0x7f0000000580)={0x7, 0x1b, 0x1}, 0x7) recvfrom$unix(r0, &(0x7f00000005c0)=""/23, 0x17, 0x3, &(0x7f0000000600)=@file={0x0, './file0/file0\x00'}, 0x6e) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:55 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x3f000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000009}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000023d, 0x0) 23:20:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000278, 0x0) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400003e8}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000007}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:56 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f7422f0512094316d6f64653d30303030303030303030303030303030303034303030342c7573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000240}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000166, 0x0) 23:20:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000c9, 0x0) 23:20:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400003e8}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000700}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 7: openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="230000030000008293fd8506b14adb772921ae1d6f72adbcc5b43199292ce9f1f01286115101d132d15c23a4b72b4a57de70ffa05151900310973a278ec0a1545dbccc42610c8853636ccf7ea5f93001e1bd373b0c6cabe79d"], 0x18}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x1f, 0x2202) mkdirat(r1, &(0x7f0000000600)='./file0\x00', 0x40000100000103) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303030303030302c757365725f69643d4c5396328ec67f0a890b67ed297081ab21c2099b1dd5f63631caf594678f80068ce7e9d5a1e89aad85774ba345c92d2a347804b0d227ad8d37bca14bfdd250678f98424745b39cc21a94cf93f9738ef7dbfb6770c9ae27de50fb6269000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='QB']) read$FUSE(r2, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000000)='./file0\x00', 0x8) stat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() write$FUSE_ENTRY(r2, &(0x7f00000007c0)={0x90, 0x0, 0x8, {0x4, 0x3, 0x3f, 0x4, 0x19, 0x7, {0x1, 0x3ff, 0x0, 0x9, 0x1, 0x9, 0x2, 0x1, 0x7ff, 0x0, 0x10000, r3, r4, 0x9, 0x1f}}}, 0x90) write(r2, &(0x7f0000000400)="a3e02a3538be7a0c142f5a3dabfaa49e77fdb59f930e816999c53b731a892a8c36434da0a733cd9685cced977cdf845d0cb05255b31fb967e88cd6c4cedc8bbe4cda8e1ccf9609e729c5f365dd82e3511c4a31547b165688d032", 0x5a) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r2, &(0x7f0000002000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r2, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r5 = dup(r2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0xc0505350, &(0x7f0000000480)={{0x80000001, 0x2}, {0x6, 0x8}, 0x8, 0x1, 0x2}) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000240)={0x88f, 0x101, 0x8, 0x100000001, 0x100000000, 0x0, 0x9, 0x3, 0x6, 0x26f}) 23:20:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000cc, 0x0) 23:20:56 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000009}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000246, 0x0) 23:20:56 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000240)=@sco, &(0x7f0000000140)=0x80, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x5c, @empty, 0x6ef4}], 0x1c) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e3a0f"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f00000002c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40008055}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="00fc1b2eea391a5af00d09af7c79eb2f2e9b8ba41851bc810000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet6_sctp(0xa, 0x1, 0x84) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000001c0)={0x5, 0x7117, 0x55, 0x7f, 0x5, 0xe3}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) [ 275.516713] Unknown ioctl -1070574846 [ 275.543474] Unknown ioctl -1070574846 23:20:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40003400}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x8055000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000029c, 0x0) 23:20:56 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) uselib(&(0x7f0000000140)='./file0\x00') write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000002c0)={0x9, 0x4555a4d1, 0x13bb, 0x10000}, 0x10) 23:20:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000291, 0x0) 23:20:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000e00}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c1cb8ed045b1958111092f4534e89ac373f65db4a1c8324c012a88219ba46338358cd62af4f789fd9c07ea5b1620968c982f567d92f27b678087cd3c35c22538451d6f13413c3ed772460f0f5b8cfd90c5582e213edcb1d51f3711d6d1964a3dd4e7fabd3920fd470678d8a602d2d69e109495432202e17d7ebb29ee8fbf006dd69fdad2bf9b936fddc"]) read$FUSE(r0, &(0x7f00000030c0), 0xfffffffffffffde3) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x401}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000400)={r2, 0x1, 0x3, 0x6}, 0x10) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') read$FUSE(r1, &(0x7f0000002000), 0x1000) prctl$setfpexc(0xc, 0x140082) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000640)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x60, r3, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x51e, 0x40) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:57 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000144, 0x0) 23:20:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000214, 0x0) 23:20:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:57 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) fanotify_init(0x11, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:58 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x5, 0x2, [0x3, 0x20]}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={r2, 0x1ff, 0x61}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f3, 0x0) 23:20:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000123, 0x0) 23:20:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400001f4}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0xffffffffffffffe2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000023, 0x0) 23:20:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000e803}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000004e, 0x0) 23:20:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:20:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000037, 0x0) 23:20:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40005580}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000011}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000266, 0x0) 23:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000a00}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000037, 0x0) 23:20:59 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x9e3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0xffffffffffffffe2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:20:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:20:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:20:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000113, 0x0) 23:21:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000e00,blksize=0x0000000000000200,\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x7, 0x10000) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000a}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c9, 0x0) 23:21:00 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = dup(r0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x73c, 0x800) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000400)="0f0966baf80cb8c2b90183ef66bafc0c66b803f966ef0fc7280f013ac4c2fd2023c4c1ed72d30966ba4200ed66baf80cb8943f798fef66bafc0ced66ba410066b8000066eff3ad", 0x47}], 0x1, 0x0, &(0x7f00000002c0), 0x0) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000028a, 0x0) 23:21:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40004002}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:00 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, 0x8}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = dup(r0) r2 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x73c, 0x800) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f0000000400)="0f0966baf80cb8c2b90183ef66bafc0c66b803f966ef0fc7280f013ac4c2fd2023c4c1ed72d30966ba4200ed66baf80cb8943f798fef66bafc0ced66ba410066b8000066eff3ad", 0x47}], 0x1, 0x0, &(0x7f00000002c0), 0x0) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000f401}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000091, 0x0) 23:21:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) 23:21:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) uselib(&(0x7f0000000140)='./file0\x00') write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000002c0)={0x9, 0x4555a4d1, 0x13bb, 0x10000}, 0x10) 23:21:01 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000e}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000184, 0x0) 23:21:01 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xfffffffffffffbdf, 0x200000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000034}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f6, 0x0) 23:21:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001d1, 0x0) 23:21:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40003f00}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40001100}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017f, 0x0) 23:21:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000900}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000059, 0x0) 23:21:02 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000233, 0x0) 23:21:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000a, 0x0) 23:21:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0x2000050c, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:03 executing program 7: r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x400041) write$tun(r0, &(0x7f0000002000)={@void, @val={0x3, 0x3, 0x6, 0xb1f2, 0x4, 0x9}, @llc={@llc={0xfe, 0xfc, "a1", "c92ca0a2a6d60fa8c8544350e782a84ebf858e555a53b607513184416e35db8b5c616b48cf6cb9ce65850484528fbfd98d2b3773e33ae83d36df620908fe777ad692597a302e55da90428cd547a7b47f1cc1df9793aa9bb996f2afae489b493b0edd9aa33dcf52037d409e58dd47648a48832561ce8ee27c1020b671c0c93979d90a3772c26da783f6c5af8fe768003689ee5cdabec94ea381f9466da73f6252dcb6446dd868c40a44777370ba5399c626eb3592194e0816d56fd323e2bc3bf5956b605d5fb108cf501d37ca92b4044a4440d0b9dad87b8dfc23f1463b302028b6650fd53769a6e9a956a38174305ef290e39e439b1c1d3979cef9f8a2b8a7531c233114d75d4f956705f344226dc56f7200a3bda6254c726c8cc7304ab961bc7761fd9a00a795edfa02c817fb9f1881c7815cd7e37c503315ed873223a8272847194a06b50c5787e06f518f831f7b5c2c1046367a3f8f9099a538470413b7bafe9e7d08b9a0d69df117069fe4bd8c4df0ad3ebc4957a81251640978f9fee62dd764c0f17d86f383f4d756148db822d59f43ba6c5bfd8d210a0e24d53256acad0a79d5538210a623bc0e0bcd16e7f006701037b0dfeb992a67381aae0ce601d365c28cdfa05a50e17486519cd245be7c4fba4eedf697c2734d8ee3e6ca2d8c6f8bc1c43f5723e00bcedb44c637f2322264617bc0d3bd7bf9c62e48524a663e9de5efeb1129cd472717b0a9d647c1790718165e959e9f93070f27b6a0b7378904b4a17f40d64336c1ab2f295af1141331c622a565c17d31886c13b2199fdddb3e02570c7b0017a9f6eea76b6f818f340da2fb222ad4ce9171a46016bc303aa64489cdb2ed0c8ae857e4ddf620c9ad62773f8df4d85c6fa728ce765875d5c049e8ae5bf50e2903250d9855e85c08b8d774590fd8a42b65c3296356e05e120532f967f8beea9bb0d71d6496e36c7ce7d6c96eea1169fe1dca3c156cbc54686023ffe40bb4748031ee176a0690f8f670714a578a235b6e82d661012bf811660bbf9886872c115b9e1ab939fd1eca4fca64155de89c8209a6c661051549eb069a440fd8a8cf532898c7bf71399f02a5e32d65881a81046032e41d96ead48b9283b70f737873bd47a76ee42447f24854bb82cd44845b5a1952d033e59c75658a113dc997d6f8ddce6767dbde10942649fed06b21a09ba7971e5022c5e8a00d2829e25030d310f9872363f97798a53929f5aa19452d8a591259fc55e4ab0d40da2b69d9d83c27f57ff15ca22a978d5314ed42116a0b32d98a79363afa1f880b0430e01e8da4158eb083eda499b4e5637d8e625f0aae2f382a2b4171c39ddde88034a1d568ecf3ca09d5bbbc531b0ba112f4ae13ac22c8fdcc28443f7b747f8af7dc9e49af187ca0e16105ca38584085c989e05edb40f4880fe8c024c75ed35021fc776e8e333c1e93afc9836f11e260d2f6a0b51f1058ae3fc2c22ef78ce7ace9a7b7922715f9225fb11358a3e887a6d151ff07cac2666a550a1abc72072dbc75e02b0d8f09c4b27ef95e9f0f2962ac57bd34a12b1296cc9a49612d092662df8d879bb55b0cb2c475de4568d26fbfe8cfa230fa668e69ae991b2b73202d385c71b3f95ebac46d619c491aa7840e05fe54ed5c30fc7ea2e973b179c9b5ddb12c31ef2b4468768633f0337025e2668f099a383d831ab0cee95d41f59104b070169d24d2eb2cbc9c3cc21282254eb9bda795e2abe1625cc44f3ab1fd8a32ac90e0615bdd5d6fa230f101f136dc9463d08743ce50f75887bca806a58b682118b7538afc8248579a2b8f39e60624bbaaca4f38f7c5e6599f9d3a3c5decdfef2b654ac1f6f684c0d484d9e02dd92d358885dd1d5af20f1d4a7067a4361215849bf9edb191ea858ef6d3c1096fc354ba91d27d86d9f589f52b8bcd59455b63b4591569479ccc0d4afa66bf646109d366a92908c2baec24cfdd1012f659fcdc52a6fb516b87b1a473da4cb05607ff4fba13768d18f3813ee3151e87b46c7dff43f973901091b7f406f55b7051da8c58d94a04fa2b015b4de4031d1d514155360e8274b7337d896d572aaa560dc13a6c2aa9e99a0b473d1718b615ae95be6867d15cf997d3ffbc831d8951444196532822bfffa5cda36c4768a27cbb6b372c31fc1d6fd5b724ecde9b6d166d2cf349241d067c35e1ed5b8cf786d255ba7a58cac199924a83dacd2dd24c6aa60ff71940fafbcd773f6f09a2a788d25001246d54a1b4137cbabba3a12799eb51c8aa004b6dc421c37692f0c6c6827fe2aac9948ab28de2f379fe4884bd314a1e7d22c8ca7596b9e85fe851ec1da2a9a581279001604e5513b07a4d1339c9ff70c30ab29fc4d94dcda36b8e7b66da45a1ba71c47257e7cfec6d44001047a7c89d80120b8c29a6a6ca4d4533e3069dc1f6bab208967f3c299182c7b7b65997c893fc96a928a6cd6a44596378f0fcc0d9437239345b9a62065b4d05a6f8dc8618b2f8b066ec75d65b4e852f30b802bf73c5f5ba600905d3ec3194f9e7d5bdefd56cefdc5d0e978b260a0df5a7078e6a5773af21854ed58e1c1a5ab4d8874993c295673da0a7847f40272d2fbb2f8a979ca4580d824bec8bdc2ed31ccc7945d87ad342380002b8723b564b0ab2fc29e342f1f7541321632517acbff9db4760f112b8c9b0ed4f357cdd1aeb3ee5a2245a6c867c6a01b8f6dae17ade566c12c0a27c89d35b54c68ae62c726da28a6a5eaa30a4a6d61f363bbdc7fe5e8df01c723a9c4e117ec57e03296556c563cdf63bd27521e2db76c0e53e0fed671a537dde6c5c2658c4866f40a844ec4c6feb87936aaabfecf873fccfa11fd5cb0b08ebca48712f4b7288ee6f10ef1e4ecf44890dfb0ecc1e75b0a9e5e8676ce03c2436ae5d30c49f8113395309cd1733f046ccd9db0d27ae45126b900c4359889762ff3139c16534e98eaff8bf28286297ccf13e5f425854d0a471037e171427e9b3d9b9dbdbdd3aab35a40bec31aad23f64351bc194e50a6f69fc1f2847f37a38e84e693f516ee540793128e05af9991a86d2ce3346cc33217bafe9c7c761f5b86cb8ee8e007c7e95abfcb4c35220eae8f8149b92f37dad40b0f57a9d62e62e1144b10449fcf94fa7218dfb5c813e914e53b79ff11c4617a508770ce61dde550ee88a2886f1f344aba6eb569f276fd5b80670208712de4de8c5e7bd95bbf4679983255093da6eca9e9837d61c6ec24059866ec60fea2ca010e5e0d63efd5d624fdf8b31d6988ede2a02d9508cb3b5b1131f2ad47053eb77a81892767d9b50deeaa7a064a26e09be586db839fb509dbd00875fbf0b7d349e68452912fe1a762d0890a87856113a08babc1a485ecc9c4357a2b5992ca1d1989bb43a77f71dc6a3b9142124f12e83c1687d0188463354e9223f77b8c1b200906a8e4ebf44fab5ad72a2cf6690c9ae0ad3c8ff2e2aeff490b0e7f64f8b32598901e1978890f2253db6613eec156535b6ae426968b6f4adf0e00d6d95463bf34e62c885b2120940376c96b3a8b1aae6f705f53ef4e900081d3ab00ce4950c6d5e45649dc6371a05c542cbc6139c10e539a1ae4fcdea082997f104e1cf81378044e9d4d3f59d1bcd503176f9a9625efbaa658ee90a3b95c2c130451b5ea7f77a6a55eae7185f791acf0590fe973096abaffd17583bbb69e7bfca723b0a0e615a0231543d5958d11ba8c6ec51a8313bc8a62757b43a021d694572919da4872330b0b864a202afcbadd9678e5013c9f04053abd40844450f50b6e986eefd3118dcc8d3d30e0dcba0bbec4c2171b07a26e7ea1e1a870ee76d5d4d7964e12fa8e81d7eae44cc7d453e16dd4489a1d22b686d04bea5ec84b93ac465a1ec7cff80fa70a420ab6291afaa6ee6d92f77ade6b42033c794f1650d0ba25bbd3f64e7ef7ede0773b4de05bb4bf5c089f29f9ae5118b0309421861195804eebe576759061abe26e99729ec30d1373adba3082bcb7b86286676cf3076dcac1ca3e815ebc5a975a0b3dd9acf271aead1a9bb6ea1509b3b26114141873fce4fd3d676b085aa0ee39474e4d5eef6b0d08042efc3cee57d2cf99b682b59c81b12742f35b261925ddbd88c072df3376080b824fdc3743d16025bb291b42eb5657dc0f99262c066b567e86b3d4b85df96ed3b5d8aeb906c3bd635368c0d095e695ebb73abe17c2eaec5502f482d85295e9a65dd22dd3741e3f0d83bc98d2b4ae2826e7ff922cd73fc0008b9f91de4a17fde7e7ac3106d2d04bbd9222133a8c40493912550e83860e6458bc216533660c2b915fe8da5f4b09e88b2d072e308f5afdba6a87f422acd3e9b8ce4a0caa9533e95bb4ffc447cbe3cd06d6952ffdfe0ddc1184849384e67bec9e9f0eb29e239b61319b25791c795aca17a95f1d184cf2f372482b5a003aebdf9818aae0779a14593929e9c894c9690478543c4b2bff72047c28424bf450666c215ce6e5ec975966b44ea28de15bf8e07416775116888fa21b0fe405c6a6cb88057459aaa13a8cf358250f72a935612646500c37806efc655b8ad9994faf2c73e088973e665db791124a7c55312b7f655eca7e4822fa292a30cf77bc7645a7193a83cddcb3cf6f7bbeafcd00cecbeb44facddc23d63f3f236c80568c142860acc8fac302fff4980f0dfb39601625f47d063a549243ba3bd0f3279dfbc4dddce1d37f69cef28460c8d202f49516d933b435a31d12484e317a337a7ccfbc5772fe0f018cce4af894fc39b47bff61f0388f2917de25137eedc12d159163f814574b3142f74f78ccfc5f0c1172150851439c002c4a20f20d1a63352e905f58f6654b6311c6cb1e2902e5b23658d4f8bc08d8e288c9e9fd4a522b20f2c0013a4bf352eba1e0244388272cbca6b6ce1ac05a8de91988721eae2f7a30bf8017cd4a13aa7d94ad5b26fb6c04798a871687a771ec0d971b5cdaf80edee41595927e66f93cfe1f4d4d8b990234ac80abaef047a5ccc463af10b81a273b7b47c5f9073a1269cbbe929481df9e12e9352f0f82d7d5d3f021cba3a8d68a73b638b94132f11249700acd2cf4d993d23ed555617fd30cea6580084c7390ac87a0d195217c5699344fd534fb5c603c1961dfab83a29c9330803124b74a8b31de1e9ec2ff856064813b5a7d118b1faa7f1105efe0aef20ce268487127cec3cab6b9940594c1dc4b0c5a5a38f4b635f6762834e2d82b4cb37c120841c4b92bf5246a36c9edbb7498a767f14b680d88bb83c6467bec7a95061b0c4abf0871468ba974d7f0b6f906afe296840a000c22f768a41a7824e1264e9bfea9dfc94a98ffe83ccbc67b66ee039348e48cf7e4345ec31d86a376fe77477d53756053d61b4b1d3480966245bbcfbb412e0e405b351d7f608aba6f2e786068b9c7f622f38e44f99dc2de6eaebf4bc65c976021f150679cbe329dea7cb2666113ee52e0272df3d4a1a681cbb726fc477e336ccc1be31c5b277dd263fd579b93f21bf91b3a9b939899b86bbfac03495c2b534414abd28a3fc9480ee91589ed6acb9fecc0cbb6f0ada6af01b4ce8bd3d051d21773bc2f9cacb9be292c6df58080af776c8132f7b039e094f49f2f9e4ac28daec68cbd5e183ed8d6362bedf3f3c1cf46165ed6eb59d8a957aa6400d1d0476df39a37d56da597bae6fd09184c92b01ee0a50c1d26963c873479d12b5671b1bdb564ede24d7ea21e8590cf276fb6f62c02ce7a32365f7fb5ed97ddb2e1ca331f43a9b3ec0d47f7c3fb5ea132a039a8d4d9901cfe7abf4e3ee09287b93212ddfd67131d2e6f82be7414d9561"}}}, 0x100d) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x4}, 0x1) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001b6, 0x0) 23:21:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:03 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000017, 0x0) 23:21:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1, 0x101000) ioctl$KDSKBLED(r1, 0x4b65, 0x20000000000000) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000002c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) ptrace(0x10, r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:03 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000024f, 0x0) 23:21:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000004b, 0x0) 23:21:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:03 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000013d, 0x0) 23:21:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f00000002c0)='./file0\x00', 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0xffffffffffffffff, 0x5, {0x6, 0x0, 0x8, 0xffffffff7fffffff, 0x9, 0x1, {0x5, 0x7, 0xffffffffffff3154, 0x1, 0x5, 0x5, 0x6, 0x5, 0x1, 0x2, 0x1f, r1, r2, 0x8, 0x200}}}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000013f, 0x0) 23:21:04 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000010c, 0x0) 23:21:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000046, 0x0) 23:21:04 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000010, 0x0) 23:21:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000074, 0x0) 23:21:04 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000129, 0x0) 23:21:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d98de6f6fcfb265c42f8728941da37c35d7588cce19a6f72fc107197db6649605a1e8b1458b74d7e5edfa5830739c055d472c8f16f01121edb03a2661117ef2c36ddabc5bb9c42853f1c3c67917e716a6aee893859660db440000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000188, 0x0) 23:21:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}], 0x1, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x1000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:05 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001dd, 0x0) 23:21:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:05 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000440)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000400)={0xa, 0x4, 0xfa00, {r3}}, 0xc) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000256, 0x0) 23:21:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:05 executing program 7: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x80200, 0x0) r0 = creat(&(0x7f0000000480)='./file0\x00', 0x1) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x400, 0x101000) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000400)={0x750c, 0x1f, 0x1, 0xfff, 0x4, 0x600000000000000, 0x5, 0x700000000, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x49) ioctl$TUNSETOWNER(r4, 0x400454cc, r3) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f00000001c0)={0x2, 0x6, [{0x1, 0x0, 0x1000}, {0x1, 0x0, 0x5}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0xcb, 0x4) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000188, 0x0) 23:21:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:06 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780)='/dev/cuse\x00', 0x20000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="005fd41014946673b1d6a801b9db89bcbc990db331b86675f468f19dd79a0c663f98f8557b6a4be4cb143676f705be0100bbab428a7ac7f5529a5469840e30a386f41919ad901b6beb59faafa2d82150b4e65bdd50e22afcbe012fb528fea35c72c5496c501fa79f520001b86539077e40e911c0fcd0edeac2a22a8cc94a45f7f1eceec555097ba1dec61fcb9aa8526559dd7d08b70000a5", @ANYRESHEX=r1, @ANYBLOB="2c728d6f746d6f64653d30303030303030303030303030303030303034303030342c757365725f69643da338db54ddbf29683a4910f31cc0a928f9cf24b677bed0e8ec65c1a1931e16fa4d515c774ec75e24265e6139bee266119024d77393ca5abc53922f88cbe85684812ce6bf3a5292877b6f22d624e99981b76db348c54cdf1d0f1fc5d8ca866cc224a70dcbfd5fdc09ce9da761301e5637263d36671beacd1253d3a61e5d24b834e602924b2384972a768082e6f2308c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x862, @local, 0x3}}, 0x2, 0x3, 0xffffffffffffffff, 0x9, 0x20}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000005c0)={r3, @in={{0x2, 0x4e20}}, 0x4, 0xf2b}, &(0x7f0000000700)=0x90) write$FUSE_INIT(r1, &(0x7f0000000400)={0x50, 0x0, 0x2, {0x7, 0x1b, 0xbd, 0x8, 0x4, 0x9, 0x3, 0xb79}}, 0x50) chmod(&(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000740)='./file0\x00') read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:06 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000020e, 0x0) 23:21:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000007a, 0x0) 23:21:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303134303030342c757365725f69643de71e6f4173f2807a2789d2f7b9f6770087aa6df0dec6468048d20b5f2a2c7215d510e256b40b4c1a0735ac8e941771af476d4cd9c877444f40b0eb0c0c44351ed12ce7e88e2827e8c1f225a021c3a29cfd23dcb9a7521f17b6f993e7f216bcb1bf7ac7e548ee86ed05a93d8504ae3546164e41d261ed390a6bdc0937a1654f5089ab254ad4c7450b4700472414038b7196da03676deb321e10d82a12d2040a00000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000002c0)={0x2}, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) write$P9_ROPEN(r1, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x2, 0x1, 0x5}, 0xffffffff80000001}}, 0x18) 23:21:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x80200, 0x0) r0 = creat(&(0x7f0000000480)='./file0\x00', 0x1) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x400, 0x101000) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000400)={0x750c, 0x1f, 0x1, 0xfff, 0x4, 0x600000000000000, 0x5, 0x700000000, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x49) ioctl$TUNSETOWNER(r4, 0x400454cc, r3) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f00000001c0)={0x2, 0x6, [{0x1, 0x0, 0x1000}, {0x1, 0x0, 0x5}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0xcb, 0x4) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cb, 0x0) 23:21:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:06 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x80200, 0x0) r0 = creat(&(0x7f0000000480)='./file0\x00', 0x1) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x400, 0x101000) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000400)={0x750c, 0x1f, 0x1, 0xfff, 0x4, 0x600000000000000, 0x5, 0x700000000, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x49) ioctl$TUNSETOWNER(r4, 0x400454cc, r3) ioctl$KVM_GET_XCRS(r4, 0x8188aea6, &(0x7f00000001c0)={0x2, 0x6, [{0x1, 0x0, 0x1000}, {0x1, 0x0, 0x5}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0xcb, 0x4) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40000}, 0x80) 23:21:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x200000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:07 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000ea, 0x0) 23:21:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) r2 = memfd_create(&(0x7f00000002c0)='rootmode', 0x3) renameat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x1e8166c07f2a298b, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000026d, 0x0) 23:21:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000220, 0x0) 23:21:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000152, 0x0) 23:21:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:07 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000064, 0x0) 23:21:08 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000029, 0x0) 23:21:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xffffffffffffffe0, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000002c0)=&(0x7f00000001c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) 23:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000178, 0x0) 23:21:08 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) close(r1) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x800, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xffffffffffffff1c) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000148, 0x0) 23:21:08 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001af, 0x0) 23:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:09 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e4, 0x0) 23:21:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001fd, 0x0) 23:21:09 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) close(r1) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x800, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xffffffffffffff1c) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}], 0x1, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c6, 0x0) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x400000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x3, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18, 0x40000}, 0x80) 23:21:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000124, 0x0) 23:21:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000002f, 0x0) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c005e7c361fdb65852045f2807fc8502c28b5ba47ecceda9b47289390aa204ed2804f9d192ee1ed3013ed08b9bc658d45dd053b488725e983b1eb370ecb2a45f4ad328eb44398f1e73084c2d37c3216a58c20a89cfe5867c4c1e943712ca50102b16538291fd4a5e0a735ff9eee0d381ce3240c7f8ae6e7fb72f19b3c89caf3673a6db00520696505c5d9c871b2071fff649bab67acf034615212c54130927817ab42a9a9d2ba6a65cc4b94a9f242d36dc7f7"]) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x8) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0xfffffffffffffeec, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3f00000000000000, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000258, 0x0) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x84a, 0x0, 0x0, 0x4000}}}, 0x78) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, 0x1, 0x2}, &(0x7f0000000400)=0x10) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a4, 0x0) 23:21:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001a0, 0x0) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x80) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000165, 0x0) 23:21:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000a5, 0x0) 23:21:11 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fdE', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f00000001c0)=0x5) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x7, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000014a, 0x0) 23:21:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x3f00, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d71a78876e06526e27444da7f57278fab1166be9233bc6d060ac991d697d380c4bda941ff6621a848e8ca937403eb8e20e86279260906cfeaac61b8d6ff23355b67b4222698cdb025045ab1b6daacd8ad9eb05406088915a3caf5e717c0a253de2b1e39eb2eb4d872508b313e5a7f4905026d5072fb1fd03eb4e09a83afbcc16dbddb2f97fa519126ba2b0019c6a83b0614cb4c2c48e0eec2be50a39456414ceea71d8a16425160520aebd5ff68dccbac8fa9de5e27931a4c362f78", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40000}, 0x80) 23:21:11 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000140)='./file0\x00', 0x200, 0xcc) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_WRITE(r0, &(0x7f0000000100)={0x18, 0x0, 0x6, {0x5}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000004, 0x0) 23:21:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x0) 23:21:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000b7, 0x0) 23:21:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000094, 0x0) 23:21:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000021c, 0x0) 23:21:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 23:21:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x800, 0x0) r2 = accept4$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000640)=0x2544deee8017e66e, 0x80800) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000500)={'filter\x00'}, &(0x7f00000002c0)=0x54) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008700)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000008800)=0xe8) connect(r2, &(0x7f0000008840)=@ll={0x11, 0xf7, r3, 0x1, 0xffffffff, 0x6, @random="817589146857"}, 0x80) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x4000, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000400)="e3f20778629d729ccde06256ee3a4a41265241c65786a7ff7f967d90ec79e14543c4d62e33f4e83340f17afa5abdadb0f004e73e5b83e896bcc5117ea5716ec7ec5139eb20b5f4289886e3c255f01ba20df01b358c974badefe8aa3ffce9a7e7469ebeed50ddc15d57930ef44ecc9409316084d0381e2fa2c47391e570276615c86fabfd9e3bb82abe56630a0359b91a868acf2c67b765e8277acffde107cbb0a67cd60d7ab028a72b8b35b763b697ec93f371cbcec73b6bb076b4d938144f14d115e4c4e9b9649ae9c733e8fdbbc61e557f7ff1abaf397387538700db75cfeca405", 0xe2) 23:21:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}], 0x1, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000016f, 0x0) 23:21:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000264, 0x0) 23:21:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000b9, 0x0) 23:21:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:13 executing program 7: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fcntl$setlease(r0, 0x400, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="66643d27c8f7195b06000000000000000000a4f61c000000000000e0252e4e3b753ee2ff7dd4ef9b27b8d875f7f58fc7136f1c287dfe9de2a1bcebdf361febd5bac24b23b5fa9eac5a338dd0d837e0f9417a8992dc1fc041b6a099d92193f730ae9ccad02d5c352e2ef6bee2646bdaf3ce92", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000400)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x5, 0x4300, 0x9, 0x5, 0x2}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getgid() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8100, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x0, 0xe50}, &(0x7f0000000240)=0x8) sendmsg$rds(r2, &(0x7f0000000540)={&(0x7f0000000280)={0x2, 0x4e23}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000480)=""/109, 0x6d}], 0x1, &(0x7f0000000500)}, 0x20000000) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000002000)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], 0x1008) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000138, 0x0) 23:21:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:21:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f00000002c0)='./file0\x00', 0x80000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x400000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000001c0)={0x1, 0x1, &(0x7f0000000400)=""/248, &(0x7f0000000180)=""/55, &(0x7f0000000500)=""/157, 0xf004}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000015f, 0x0) 23:21:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000083, 0x0) 23:21:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000138, 0x0) 23:21:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) 23:21:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000015b, 0x0) 23:21:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000027a, 0x0) 23:21:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101800) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000240)=""/94) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000400)={0x45, 0x6, 0x0, {0x0, 0x6, 0x1c, 0x0, 'vmnet1]selinuxvmnet1system+\''}}, 0x45) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000044004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67722fb81a710375705f69643d2759d42e0f5849d554efdcf70412d3fec83ff984dda6eb89a2ee232e998bed02000e9976a145948664a831f5d8b3c8d53ea642741ff6f9c26254219cbb5fccb8ca731754b3359c490fb582f2c6d3950b90c85fbdde17c940be9303f05d7a6608a138b450c716c67cbecb8d9d2df9634db0c1f8037d3c0089268ac25f513315", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000250, 0x0) 23:21:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:21:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:14 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0xfffffffffffffffe, 0x0, 0x0, {0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0xfd55) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="98000000", @ANYRES16=r2, @ANYBLOB="100525bd7000fbdbdf250f00000018000100080001000a0000000c000700100000002c00000008000400070000043c00010008000600776c63000c00070014000000010000000800060064680000080002005e0000000c0007002000000006000000080005000400000020000200140001000000000000000000000000000000000108000600040000000800050009000000"], 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004050) 23:21:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000274, 0x0) 23:21:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x40000}, 0x80) 23:21:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000e3, 0x0) 23:21:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f00000002c0)='./file0\x00', 0x80000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x400000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000001c0)={0x1, 0x1, &(0x7f0000000400)=""/248, &(0x7f0000000180)=""/55, &(0x7f0000000500)=""/157, 0xf004}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000015f, 0x0) 23:21:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000233, 0x0) 23:21:14 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:21:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000640)={@loopback, 0x7d, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000600)={0x1000, 0x81, 0x3f, 0x4, 0x401}, 0x14) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000540)={0x2a, 0x1}) clock_gettime(0x3, &(0x7f0000000480)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x4) r5 = gettid() migrate_pages(r5, 0x7fff, &(0x7f0000000200)=0x8, &(0x7f00000003c0)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000005c0)={0x2, 0x3, 0x5, 0x4000000000, 0x5, 0x9}) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x41, 0x1}}, 0x14) sendmsg$alg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000680)="ac43e7d725f1c9922bbf273ac76d2c3820f2d8b7e6e840b6b35e30abb5a26ecea136151a8a624c8fafaca495af5f4cdbd225ebc68a7aad36d2bcc4c62ce8d6a649e26f25264cdb58d1ea7754a1c1d07733899c1956d36058ecb906019c63693b2fef1162d4a9d278b44654b494f31cab97bb01c8b8e8e5464ee61f7f1ad0d76d885a3d816d6b43395bffdf04e29f952f658b1f9010a464c0518e238d680d19c946ab741ab342a848cde648c5cc29c0acbf36b35cff5dd43f9cd2233298ac9a1ffa65990b67ab48f8ad2243fad2cd1c54d7583c675d2ac9edc704fa4cf36b724d63ff6e0eb018966a16b9", 0xea}, {&(0x7f0000000140)="189c80bce5e2be23836418cf150c2fd850c32471d834b07892c1394b57593f6f8d0c2358d90da527f788770e81f88add9ccee1cb4b23", 0x36}], 0x2, &(0x7f00000007c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x30, 0x40000}, 0x80) seccomp(0x0, 0x1, &(0x7f0000000500)={0x9, &(0x7f0000000400)=[{0x7, 0x6, 0x6, 0xffffffff}, {0x7c2, 0x0, 0x80000001, 0xff}, {0x4, 0x403, 0x80000001, 0x1}, {0x400, 0x0, 0x7}, {0x9, 0xffff, 0x1, 0x3f}, {0x92, 0x3, 0x6, 0xffffffff00000000}, {0xffffffffffffad11, 0x9, 0x2}, {0x1, 0x9d8f, 0x3, 0x717bf7}, {0x9b, 0x8, 0x100000001, 0x7}]}) socket$inet_udplite(0x2, 0x2, 0x88) 23:21:14 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000151, 0x0) 23:21:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6772f959705f69643da2372f40ae3a8ccea55626b466451d8f13f77b92404b722b00004bfa00964a978a6b67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18, 0x40000}, 0x80) 23:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000007d, 0x0) 23:21:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000440)='./file0\x00', 0x20025) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f0, 0x0) 23:21:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000142, 0x0) 23:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7ff, 0x4e7dcaefaa4f2b3c) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x4800, 0x3) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7ff, 0x4e7dcaefaa4f2b3c) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x4800, 0x3) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000023b, 0x0) [ 294.672536] [ 294.674223] ================================================ [ 294.680026] WARNING: lock held when returning to user space! [ 294.685832] 4.18.0+ #201 Not tainted [ 294.689537] ------------------------------------------------ [ 294.695328] syz-executor7/17293 is leaving the kernel with locks still held! [ 294.702513] 1 lock held by syz-executor7/17293: [ 294.707170] #0: 00000000c29da016 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xaf/0xe0 23:21:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x80) 23:21:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000194, 0x0) 23:21:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000223, 0x0) 23:21:16 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000075, 0x0) 23:21:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000023a, 0x0) 23:21:16 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x8100, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f00000002c0)) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x8, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffe}}}, 0x78) chdir(&(0x7f0000000140)='./file0\x00') 23:21:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x0) 23:21:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000253, 0x0) 23:21:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000006d, 0x0) 23:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0), 0x0, 0x40000}, 0x80) 23:21:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:17 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000aa, 0x0) 23:21:17 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000008b, 0x0) 23:21:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) 23:21:17 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001fa, 0x0) 23:21:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) 23:21:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:17 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000185, 0x0) 23:21:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 23:21:17 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x5, 0x3) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x13}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e24, 0x70b, @mcast2, 0x5}}}, 0x84) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fv?', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000266, 0x0) 23:21:18 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ca, 0x0) 23:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18, 0x40000}, 0x80) 23:21:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000140)='./file0\x00', 0x0) 23:21:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:18 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x480) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000002c0)=0x7, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x2000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xffffffffffffff43) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}}}, 0x78) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) 23:21:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) 23:21:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:21:18 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)={0xffffffffffffffff}) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) sysinfo(&(0x7f0000000700)=""/33) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x1000, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xc00}}]}}) getsockopt(r1, 0x7fff, 0xffffffffffff7fff, &(0x7f0000002000)=""/4096, &(0x7f0000000140)=0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) 23:21:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:18 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001dc, 0x0) 23:21:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x80) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) 23:21:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000212, 0x0) 23:21:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:21:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:18 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:21:18 executing program 4: mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:21:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='veth0\x00', 0x10) 23:21:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6f75705f69643d310d5dc2a857dee54f518a34e156f1c1b11b784e3f9dfd7fe6c6b06848fe50e53b79e43141f3f4692ee1ed3a8ed4152b7bac38bee9bbee83395d74be0a68293ac4dbe96d42e1984daccbe40999cc4af9a4364196ebd1cf12e537521365bf865af18a38cbe088bf500600cafe8907d318e3a2825893f4064b905421b08992fcad7a5fc0cd63af6279491072a0d16cedca", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000090c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x40, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1000, 0x2) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000001c0)={0x9, 0x5, 0x9}, 0xc) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:19 executing program 4: mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:21:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) chmod(&(0x7f0000000180)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) sendmsg$alg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=[@op={0x18}], 0x18}, 0x0) 23:21:19 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ab, 0x0) 23:21:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000c2, 0x0) 23:21:19 executing program 4: mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 23:21:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0xb87) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1", @ANYRESDEC=0x0]) 23:21:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1d887c365307355bd4c6c0c647d807e60f8082c6f7608ec95b510445b41db28ebe846fb644ab30bcaa86ff21e42ecc6f384490615798c8850e48f0a11ef98d6c4edd2370a25dbf3a05e1ae13b9ca8e97bd64890927178f1bb883523c73d8bec784614b6707f2a89f1f41c4fda879eb7e84beabfa18de9feb414fe0977a5c2aea0e56f37825fc721466b815f9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000244, 0x0) 23:21:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7b705f64643dc209aa0b5f6e30d17dcb25be7a88bd8a6875a6769b77293a0d3cadcea22f58a27d5b0f81705a9511e7155a9bbc0ce69ac32ebcc884bf3f53688b9dad6d1dd7d4d2d7d432f624adc86c893eccdf87b588601fef93aaf72c0e0f4cf0d2b7372f3bdf2b18dee3794f7b0602834db6b953aeb846d24cb658472515d0364897ed764da11f3bc76bd919dccc2ad6035213df7b4cbd44208208a1"]) 23:21:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000155, 0x0) 23:21:20 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYRESOCT=r0], @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x40000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) lookup_dcookie(0x0, &(0x7f0000000280)=""/24, 0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x4000, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x600, 0x0) 23:21:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0]) 23:21:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:20 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000015d, 0x0) 23:21:20 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 23:21:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040004,user_id=']) 23:21:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:20 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x0, 0x2a98}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000400)={0x0, 0x8}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000480)={r2, 0xabf, 0x7, 0x7, 0x1, 0xd60, 0x65, 0x8, {r3, @in6={{0xa, 0x4e22, 0x0, @empty, 0x7fffffff}}, 0x9, 0x1, 0xfffffffffffffffa, 0xfffffffffffffff9, 0xffff}}, &(0x7f0000000540)=0xb0) 23:21:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 23:21:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=']) 23:21:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:21 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) dup2(r0, r0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xa, 0x31fff) 23:21:21 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000017b, 0x0) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000198, 0x0) 23:21:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000ed, 0x0) 23:21:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) 23:21:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000155, 0x0) 23:21:21 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001c4, 0x0) 23:21:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 23:21:21 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) signalfd4(r0, &(0x7f0000000600)={0x2}, 0x8, 0x800) lremovexattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a80)=@random={'system.', '[\x00'}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000ac0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8240) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000b00)=0x4, &(0x7f0000000b40)=0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r2 = accept4(0xffffffffffffffff, &(0x7f0000000480)=@nfc, &(0x7f00000001c0)=0x80, 0x800) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000700)=""/142, 0x8e}, {&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000000440)=""/19, 0x13}, {&(0x7f00000007c0)=""/208, 0xd0}, {&(0x7f00000008c0)=""/210, 0xd2}], 0x9, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @host}, 0x10) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x2}}, 0x0) 23:21:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000025f, 0x0) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x10}}, 0x0) 23:21:21 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000045, 0x0) 23:21:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) 23:21:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) dup2(r0, r0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xa, 0x31fff) 23:21:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x35}}, 0x0) 23:21:21 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000012b, 0x0) 23:21:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0xfffffdef}}, 0x0) 23:21:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) 23:21:22 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) signalfd4(r0, &(0x7f0000000600)={0x2}, 0x8, 0x800) lremovexattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a80)=@random={'system.', '[\x00'}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000ac0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8240) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000b00)=0x4, &(0x7f0000000b40)=0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r2 = accept4(0xffffffffffffffff, &(0x7f0000000480)=@nfc, &(0x7f00000001c0)=0x80, 0x800) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000700)=""/142, 0x8e}, {&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000000440)=""/19, 0x13}, {&(0x7f00000007c0)=""/208, 0xd0}, {&(0x7f00000008c0)=""/210, 0xd2}], 0x9, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @host}, 0x10) 23:21:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000071, 0x0) 23:21:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) dup2(r0, r0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xa, 0x31fff) 23:21:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0xc}}, 0x0) 23:21:22 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000212, 0x0) 23:21:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000fe, 0x0) 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1924b}}, 0x0) 23:21:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) dup2(r0, r0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xa, 0x31fff) 23:21:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1a000}}, 0x0) 23:21:22 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000203, 0x0) 23:21:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x8}}, 0x0) 23:21:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 23:21:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ea, 0x0) 23:21:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) dup2(r0, r0) 23:21:23 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) signalfd4(r0, &(0x7f0000000600)={0x2}, 0x8, 0x800) lremovexattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a80)=@random={'system.', '[\x00'}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000ac0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8240) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000b00)=0x4, &(0x7f0000000b40)=0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) r2 = accept4(0xffffffffffffffff, &(0x7f0000000480)=@nfc, &(0x7f00000001c0)=0x80, 0x800) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000700)=""/142, 0x8e}, {&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000000440)=""/19, 0x13}, {&(0x7f00000007c0)=""/208, 0xd0}, {&(0x7f00000008c0)=""/210, 0xd2}], 0x9, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @host}, 0x10) 23:21:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ba, 0x0) 23:21:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x200003c1}}, 0x0) 23:21:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000022, 0x0) 23:21:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) dup2(r0, r0) 23:21:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 23:21:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 23:21:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x502}}, 0x0) 23:21:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000046, 0x0) 23:21:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) shmctl$SHM_UNLOCK(0x0, 0xc) 23:21:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7ffff000}}, 0x0) 23:21:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f0, 0x0) 23:21:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e8, 0x0) 23:21:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x400000, 0x0) fadvise64(r1, 0x0, 0x5, 0x7) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000030c0), 0x1000) chmod(&(0x7f0000000180)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0xa80c) openat(r2, &(0x7f0000000400)='./file0\x00', 0x280000, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0x10) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 23:21:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x100000000000007d, 0x0) 23:21:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000080)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x4}}, 0x0) 23:21:24 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f