\xdbmM\xb1\x98x\x19/5\\/=\xd3\xf9\xde\xb4\x12\xda\x89\xc8\xd1=\xbb\x00\x916\x97\xdd\xa0\xfbH\xad\xa9J\x1d\n\x15$\xbf\xfe\xec\'?^HxA', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000080)=""/67, 0x43}], 0x1, 0x0) 07:01:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x1000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x500000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd30000000000000]}) 07:01:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffaf, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 07:01:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe30000000000000]}) 07:01:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffb4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x1810000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x600000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$unix(0x1, 0x0, 0x0) umount2(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) listen(0xffffffffffffffff, 0x0) 07:01:24 executing program 0: clone(0xfffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @multicast1, r2}, 0xc) 07:01:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf30000000000000]}) 07:01:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x1902000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffb5, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x700000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:24 executing program 0: clone(0xffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 930.307214] RSP: 002b:00007fb556bb5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 07:01:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffc5, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.307227] RAX: ffffffffffffffda RBX: 00007fb556bb5c90 RCX: 0000000000458099 [ 930.307235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0 [ 930.326989] FAULT_INJECTION: forcing a failure. [ 930.326989] name failslab, interval 1, probability 0, space 0, times 0 [ 930.334648] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 930.334657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb556bb66d4 [ 930.334666] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 [ 930.433967] CPU: 1 PID: 19791 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #38 [ 930.441206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.450547] Call Trace: [ 930.450569] dump_stack+0x1db/0x2d0 [ 930.450589] ? dump_stack_print_info.cold+0x20/0x20 [ 930.450608] ? __f_unlock_pos+0x19/0x20 [ 930.465766] should_fail.cold+0xa/0x15 [ 930.465785] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.465805] ? ___might_sleep+0x1e7/0x310 [ 930.474755] ? arch_local_save_flags+0x50/0x50 [ 930.474772] ? vfs_write+0x2f0/0x580 [ 930.474799] __should_failslab+0x121/0x190 [ 930.491404] should_failslab+0x9/0x14 [ 930.495220] kmem_cache_alloc+0x2be/0x710 [ 930.499372] ? check_preemption_disabled+0x48/0x290 [ 930.504398] getname_flags+0xd6/0x5b0 [ 930.508200] user_path_at_empty+0x2f/0x50 [ 930.512347] path_removexattr+0xb6/0x210 [ 930.516410] ? removexattr+0x130/0x130 [ 930.520295] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.525656] ? trace_hardirqs_off_caller+0x300/0x300 [ 930.530758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 930.535532] __x64_sys_lremovexattr+0x56/0x80 [ 930.540024] do_syscall_64+0x1a3/0x800 [ 930.543916] ? syscall_return_slowpath+0x5f0/0x5f0 [ 930.548854] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 930.553874] ? __switch_to_asm+0x34/0x70 [ 930.557938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 930.562789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.567972] RIP: 0033:0x458099 07:01:26 executing program 5 (fault-call:9 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x4000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.571206] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 930.590111] RSP: 002b:00007fef41910c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c6 [ 930.597818] RAX: ffffffffffffffda RBX: 00007fef41910c90 RCX: 0000000000458099 [ 930.605173] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000020000040 [ 930.612438] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 930.619698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef419116d4 [ 930.626958] R13: 00000000004c3c47 R14: 00000000004d69e8 R15: 0000000000000004 07:01:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1530000000000000]}) 07:01:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffc7, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x4800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.793933] FAULT_INJECTION: forcing a failure. [ 930.793933] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 930.805774] CPU: 0 PID: 19805 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #38 [ 930.812958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.822393] Call Trace: [ 930.825005] dump_stack+0x1db/0x2d0 [ 930.828645] ? dump_stack_print_info.cold+0x20/0x20 [ 930.833681] should_fail.cold+0xa/0x15 [ 930.837577] ? fault_create_debugfs_attr+0x1e0/0x1e0 07:01:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x4c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.842677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.848221] ? check_preemption_disabled+0x48/0x290 [ 930.853238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.858775] ? check_preemption_disabled+0x48/0x290 [ 930.863801] ? debug_smp_processor_id+0x1c/0x20 [ 930.868484] ? perf_trace_lock+0x12f/0x750 [ 930.872741] ? __f_unlock_pos+0x19/0x20 [ 930.876732] should_fail_alloc_page+0x50/0x60 [ 930.881233] __alloc_pages_nodemask+0x323/0xdc0 [ 930.885914] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 930.890935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.896492] ? ___might_sleep+0x1e7/0x310 [ 930.900642] ? trace_hardirqs_off+0xb8/0x310 [ 930.905057] cache_grow_begin+0x9c/0x8c0 [ 930.909123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 930.914661] ? check_preemption_disabled+0x48/0x290 [ 930.919697] kmem_cache_alloc+0x645/0x710 [ 930.923852] ? do_syscall_64+0x8c/0x800 [ 930.927828] ? do_syscall_64+0x8c/0x800 [ 930.931812] getname_flags+0xd6/0x5b0 [ 930.935617] ? trace_hardirqs_off_caller+0x300/0x300 [ 930.940726] getname+0x1a/0x20 07:01:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.943918] __x64_sys_execve+0x73/0xc0 [ 930.947893] do_syscall_64+0x1a3/0x800 [ 930.951777] ? syscall_return_slowpath+0x5f0/0x5f0 [ 930.956702] ? prepare_exit_to_usermode+0x232/0x3b0 [ 930.961719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 930.966571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.971755] RIP: 0033:0x458099 [ 930.974949] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:01:26 executing program 0 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffcc, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x6800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 930.993955] RSP: 002b:00007fb556bb5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 930.993970] RAX: ffffffffffffffda RBX: 00007fb556bb5c90 RCX: 0000000000458099 [ 930.993978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200004c0 [ 930.993986] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 930.993995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb556bb66d4 [ 930.994003] R13: 00000000004be6af R14: 00000000004ced68 R15: 0000000000000004 [ 931.107625] FAULT_INJECTION: forcing a failure. [ 931.107625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 931.119459] CPU: 1 PID: 19828 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #38 [ 931.126663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.136013] Call Trace: [ 931.138600] dump_stack+0x1db/0x2d0 [ 931.142241] ? dump_stack_print_info.cold+0x20/0x20 [ 931.147271] should_fail.cold+0xa/0x15 [ 931.151171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.156278] ? check_preemption_disabled+0x48/0x290 [ 931.161301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.166845] ? check_preemption_disabled+0x48/0x290 [ 931.171863] ? debug_smp_processor_id+0x1c/0x20 [ 931.177070] ? debug_smp_processor_id+0x1c/0x20 [ 931.181739] ? perf_trace_lock+0x12f/0x750 [ 931.185972] ? add_lock_to_list.isra.0+0x450/0x450 [ 931.190904] should_fail_alloc_page+0x50/0x60 [ 931.195398] __alloc_pages_nodemask+0x323/0xdc0 [ 931.200080] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 931.205098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.210648] ? ___might_sleep+0x1e7/0x310 [ 931.214798] ? trace_hardirqs_off+0xb8/0x310 [ 931.219224] cache_grow_begin+0x9c/0x8c0 [ 931.223288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.228832] ? check_preemption_disabled+0x48/0x290 [ 931.233852] kmem_cache_alloc+0x645/0x710 [ 931.238025] getname_flags+0xd6/0x5b0 [ 931.241836] user_path_at_empty+0x2f/0x50 [ 931.245988] path_removexattr+0xb6/0x210 [ 931.250056] ? removexattr+0x130/0x130 [ 931.253945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.259310] ? trace_hardirqs_off_caller+0x300/0x300 [ 931.264414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 931.269197] __x64_sys_lremovexattr+0x56/0x80 [ 931.273691] do_syscall_64+0x1a3/0x800 [ 931.277581] ? syscall_return_slowpath+0x5f0/0x5f0 [ 931.282510] ? prepare_exit_to_usermode+0x232/0x3b0 [ 931.287533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 931.292382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.297571] RIP: 0033:0x458099 [ 931.300761] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.319656] RSP: 002b:00007fef41931c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c6 [ 931.327382] RAX: ffffffffffffffda RBX: 00007fef41931c90 RCX: 0000000000458099 [ 931.334747] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000020000040 [ 931.342026] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.349304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef419326d4 07:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1630000000000000]}) [ 931.356571] R13: 00000000004c3c47 R14: 00000000004d69e8 R15: 0000000000000004 07:01:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffcd, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1730000000000000]}) 07:01:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 0 (fault-call:3 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1830000000000000]}) 07:01:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffcf, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 931.677952] FAULT_INJECTION: forcing a failure. [ 931.677952] name failslab, interval 1, probability 0, space 0, times 0 [ 931.752673] CPU: 1 PID: 19848 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #38 [ 931.760000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.769350] Call Trace: [ 931.771944] dump_stack+0x1db/0x2d0 [ 931.775586] ? dump_stack_print_info.cold+0x20/0x20 [ 931.780613] ? debug_smp_processor_id+0x1c/0x20 [ 931.785296] ? perf_trace_lock+0x12f/0x750 [ 931.789559] should_fail.cold+0xa/0x15 [ 931.793451] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.798575] ? ___might_sleep+0x1e7/0x310 [ 931.802724] ? arch_local_save_flags+0x50/0x50 [ 931.807314] ? mark_held_locks+0xb1/0x100 [ 931.811469] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 931.816583] __should_failslab+0x121/0x190 [ 931.820827] should_failslab+0x9/0x14 [ 931.824625] kmem_cache_alloc+0x2be/0x710 [ 931.828790] __fuse_request_alloc+0x97/0x470 [ 931.833201] ? finish_wait+0x25a/0x490 [ 931.837090] ? fuse_copy_args+0x370/0x370 [ 931.841236] ? remove_wait_queue+0x300/0x300 [ 931.845646] ? replenish_dl_entity.cold+0x33/0x33 [ 931.850500] ? __might_sleep+0x95/0x190 [ 931.854488] __fuse_get_req+0x4ac/0xa00 [ 931.858494] ? fuse_put_request+0x670/0x670 [ 931.862816] ? finish_wait+0x490/0x490 [ 931.866711] ? print_usage_bug+0xd0/0xd0 [ 931.870768] ? add_lock_to_list.isra.0+0x450/0x450 [ 931.875698] fuse_simple_request+0x28/0x730 [ 931.880028] fuse_removexattr+0x2b2/0x460 [ 931.884173] ? fuse_listxattr+0x820/0x820 [ 931.888336] ? ima_inode_removexattr+0xc0/0xc0 [ 931.892925] ? fuse_permission+0x2cd/0x5d0 [ 931.897163] fuse_xattr_set+0x61/0x66 [ 931.901070] __vfs_removexattr+0x112/0x180 [ 931.905303] ? fuse_removexattr+0x460/0x460 [ 931.909620] ? __vfs_getxattr+0x150/0x150 [ 931.913766] ? evm_inode_removexattr+0x47/0x60 [ 931.918356] vfs_removexattr+0xb7/0x200 [ 931.922333] removexattr+0xda/0x130 [ 931.925956] ? vfs_removexattr+0x200/0x200 [ 931.930196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.935751] ? check_preemption_disabled+0x48/0x290 [ 931.940774] ? __lock_is_held+0xb6/0x140 [ 931.944837] ? preempt_count_add+0xbc/0x1b0 [ 931.949156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.954690] ? __mnt_want_write+0x2d9/0x430 [ 931.959013] ? may_umount_tree+0x1d0/0x1d0 [ 931.963245] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 931.968002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.973535] ? __sb_start_write+0x1ac/0x360 [ 931.977855] path_removexattr+0x1b7/0x210 [ 931.982006] ? removexattr+0x130/0x130 [ 931.985891] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.991253] ? trace_hardirqs_off_caller+0x300/0x300 [ 931.996365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 932.001129] __x64_sys_lremovexattr+0x56/0x80 [ 932.005870] do_syscall_64+0x1a3/0x800 [ 932.009768] ? syscall_return_slowpath+0x5f0/0x5f0 [ 932.014796] ? prepare_exit_to_usermode+0x232/0x3b0 [ 932.019821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 932.024674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.029859] RIP: 0033:0x458099 [ 932.033065] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:01:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffd4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) write$FUSE_OPEN(r1, &(0x7f0000000100)={0x20, 0x0, 0x7, {0x0, 0x7}}, 0x20) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x20000) clock_getres(0x5, &(0x7f0000000140)) 07:01:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYRESOCT=r0]) read$FUSE(r0, &(0x7f0000004880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x69, 0x20000) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000140)) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000410000000000000"], 0x10) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={r1, &(0x7f00000001c0)="85a3a637051af1bbf56cfe0f7519dc688c2f0aed86", &(0x7f0000002880)=""/4096}, 0x18) write$UHID_INPUT2(r0, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0xfe) 07:01:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 932.051958] RSP: 002b:00007fef41931c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c6 [ 932.059668] RAX: ffffffffffffffda RBX: 00007fef41931c90 RCX: 0000000000458099 [ 932.066934] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000020000040 [ 932.074201] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.081464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef419326d4 [ 932.088738] R13: 00000000004c3c47 R14: 00000000004d69e8 R15: 0000000000000004 07:01:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffd5, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:28 executing program 0 (fault-call:3 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x3, 0x0, 0x10000, 0x5}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x47e, r2}) unshare(0x4000400) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffdb, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x3f, 0x8000, 0x6, 0x0, 0x8000, 0x8, 0x6, 0x7}, &(0x7f00000000c0)={0x0, 0xffff, 0x2, 0x1a35, 0x9, 0x3, 0x2, 0x80}, &(0x7f0000000140)={0x5, 0x8, 0x401, 0x7, 0x9, 0x128d, 0x1, 0x2e0d}, &(0x7f0000000200)={r1, r2+10000000}, &(0x7f0000000340)={&(0x7f00000002c0)={0x1}, 0x8}) 07:01:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x10000, 0x0, 0x10000, 0x3f}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000140)={0x0, r1, 0x0, 0x3}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffdc, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = dup2(r0, r0) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18, 0x0, 0x8, {0xae}}, 0x18) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x8000000000000002, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000100)={{0x5, 0xffffffffffff0000}, 0x1, 0x35c8, 0x2, {0x0, 0x100}, 0xffffffff, 0x1f}) unshare(0x400) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc040564a, &(0x7f00000003c0)) 07:01:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xffffffdd, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x101a00, 0x0) ioctl(r0, 0x5, &(0x7f0000000340)="181d2e08f1e5fc9805214173893ecbd904cb84b77e5b583b4aed4df39adbfb766b96a7eae323f01eceeacdb8beb6ccac4dcf2f49ecd61989ff090ef17396aad2efd5c395027454e3b021190f4b2a57d73f1ee1cf2675d91a87bf5b604f86b22b312c22880e90dc87c50e02713d498967af0c434864c434123e517138456f29631863082476c7faf2613bc63ee7f33bbe67efdd8b4da3e3847f3894af333f93da43bc23e5a7d6074861558f6a02bc3d7fe5a095") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) read$FUSE(r1, &(0x7f0000000880), 0x1000) r2 = semget(0x2, 0x7, 0x10) semtimedop(r2, &(0x7f00000002c0)=[{0x0, 0x6, 0x1800}, {0x2, 0x344}, {0x0, 0xff0, 0x800}, {0x7, 0x1f, 0x1000}, {0x1, 0x4}, {0x3, 0x8}, {0x3, 0x9, 0x1000}], 0x7, &(0x7f00000004c0)={0x77359400}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_OPEN(r1, &(0x7f0000000140)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x3}}, 0x20) r3 = dup2(r0, r0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x5) r4 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000400)=""/191, &(0x7f00000000c0)=0xbf) 07:01:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 1: userfaultfd(0x80000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001f, &(0x7f0000000240)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x2000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x8, 0x8, 0x7fff, 0x9, 0x100, 0xcb, 0x3, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3, 0xfff, 0x3ff, 0x1, 0x40}, &(0x7f0000000200)=0x98) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0xfffffff5, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) r4 = getgid() r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000900)={0x0, 0x3de}, &(0x7f0000000940)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000980)={r8, 0x3, 0x20}, 0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000001880)=ANY=[@ANYBLOB="f8010000000000000500000000000000040000000000000000000000000000007e00000000000000e3c0136d00000000000800000800000000000000000000000600000000000000070000000000000001000100000000000800000000000000030000000000000001000000050000009a0000004000000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0700000001000000000000000500000000000000ff0f0000000000000f0000007b0000006b657972696e6776626f786e6574300001000000000000000100000000000000000200000000000000080000000000007f0000000100000001000000000000003a000000000000004100000000000000080000000000000008000000000000000300000000000000040000005a050000ff03000080ffffff08000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="04000000ff7f000000000000000000000000000001feffffffffffff0100000003000000400000ecffffff0005000000000000000100000000000000090000000000000000000000000000000000000071070000000000007a00000000000000060000000000000002ffffffffffffff000000000000000055e800000400000000080000310c000000000000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="01010000020000000000000002000000000000000600000000000000080000000000000073656c696e757823"], 0x1f8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="7b705ff4b28ecc23e6b6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000001ac0)) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="a43c6e57606c4a7926d056b5f3ddb9cb0c2e76072339b6f8416c3d7177cef95da0d950ca56cf30be1589bb31a23c6fad4425daff78de511234658968e70dd1be00611689d5d9748e56b6a7237a059945370ab3805b66d8af9c800cb9ff4dc434f54b06b2abe26a862aa7a68684ca36c0f3e2261cc139f7fc2161d6e5e32b7f47d1cc9129ca692e732e51b2"]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001b40)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000001bc0)={0x4, 0x8, 0xfa00, {r9, 0x1}}, 0x10) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f00000009c0)={0x9, @sliced={0xfffffffffffffffb, [0x3, 0x1, 0x100, 0xd5d, 0xf6, 0x7, 0x5d6b, 0x6, 0x0, 0x200, 0x0, 0x0, 0x1, 0xe4, 0x8000, 0xfff, 0x9, 0xfff, 0x80, 0x3, 0xffffffff, 0x9, 0x2, 0x400, 0x9, 0x5, 0x5, 0x20, 0xda0, 0x3f, 0x1, 0x3f, 0x7, 0x8000, 0x100000001, 0xffffffff, 0x9, 0x800, 0x5, 0x3, 0x80000001, 0x401, 0x7, 0x9, 0x7f, 0xfffffffffffffffa, 0x9, 0x4], 0x3ff}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001c00), 0x10fb) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000ac0)) 07:01:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x4, 0x0, 0x0, 0x7, 0xb}}) 07:01:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xb4) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000001c0)=""/120) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240)='/dev/udmabuf\x00', 0x2) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="6be29cd7e606000000625d72"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10be4df6480000000400000000000000"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000001c0)={0xc9, 0x4, 0x1, 0x4, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000480)={r2, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x6, 0x1e29, 0x3f, 0x24, 0x8, 0x16, 0x0, 0xffffffff, 0x5, 0x1, 0x8000, 0x9, 0x7, 0x1, 0x8]}, &(0x7f00000002c0)=0x100) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x5, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000000)={0x2, 0xde}) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x10}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x8f, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x10}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x48}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = semget$private(0x0, 0x2, 0x521) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x800, 0x7f, 0x393c, 0x0, 0x5, 0xa8, 0x3, 0x9, 0x933]) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 07:01:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x48}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x68}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xa, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000100)=""/131) 07:01:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e21, @local}}, 0xfffffffffffffbff}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0xfffffffeffffffff}, 0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f6570596dcc509fdb85e54ffbb5bedfe30a189d581ce18490672e801251cd3f970173210d410d99fec319a660b5d7fd4e8893fa", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000000000000000000"], 0x10) 07:01:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x68}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 938.149405] Unknown ioctl -2131205114 07:01:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xf, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x40000) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x80000001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x80, 0x4000) getpeername(r1, &(0x7f00000001c0)=@sco, &(0x7f00000000c0)=0x80) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x74}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x74}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x10, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x501200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x0, 0x1, 'client1\x00', 0xffffffff80000000, "38df81ec87d98122", "1d94c6e3d2027f1c3d2247291cabf041808199e83b61669eaf55833a49ab227b", 0x9, 0x1b}) unshare(0x40003ff) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:01:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80440, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={0x0, 0xffffffff, 0x9, 0xb0, 0x8, 0x0, 0x100000000, 0x1, {0x0, @in6={{0xa, 0x1, 0x4, @loopback, 0x7}}, 0xfffffffffffffffb, 0xff, 0x20, 0x1, 0x8}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x8, 0x10000, 0x5, 0x8000, 0x5, 0x6, 0x615b, 0x1, r2}, 0x20) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x40, 0x2000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000001c0)={0x7ff, 0x6, 0x6, 0xe8e5, 0x8, 0x2}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x3, 'veth1_to_bridge\x00', 0x2}, 0x18) 07:01:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x3, 0xf3, &(0x7f0000000100)=""/243, 0x0, 0x1, [], r1}, 0x48) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x219}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x18, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000340)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x280000, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$ppp(r2, &(0x7f00000000c0)="5a84ea683d3ca6ee71e9f21c6b041a106e", 0x11) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000001c0)=""/53) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3c, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x300}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x219}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x500}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x600}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x47, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="06001f023c9ea62de5202c21732442996976b90904f3a45728b4da2c77ffd3c10bf494f26fe5d243b70037906b3551063658f43bee38768c3ef4fec51439496b312f9d998a6a076019670678") unshare(0x4000400) r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x8000000091, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0x10000, 0x10001, @value=0x3}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc040564a, &(0x7f00000003c0)) 07:01:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x300}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400800, 0x0) write$P9_RLERROR(r1, &(0x7f00000000c0)={0x19, 0x7, 0x2, {0x10, '&!GPLeth1cgroup^'}}, 0x19) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x118) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101000, 0x80) mkdirat(r1, &(0x7f00000000c0)='./file1\x00', 0x43) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000, 0x200) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x900000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 07:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x5) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x700}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x48, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x500}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fcntl$getflags(r0, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000000000000400000000000000c408b702c3078d2c9ba0bf895d7bfa5c2481ad30c39b43f20ebb68a76aa3d224426b575e99ca33fdb76f48e7701e4fa831464d85fcc5f9ab7e2efd1f1abe608ed4d93538f8eb85cb6b2d8bcbaff48693666d4e9fd136492dd99375a1aa8fa3fdf4b3778f0d48fad84ab4fea3f07de235642127920bc9dc075b378c93acd3dd25afb010b190070a1919b26fadfa0da52bfed16bf87a27f90d9233458c22514fffceb3b48eccfcd9b2c128201efbb49639c5e08bd931df1c761d7e453c0158c44277"], 0x10) 07:01:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4c, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000002, 0x11, r2, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:01:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x600}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x61, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1018}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(r0, r1) r2 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x4, 0x600881) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) bind$tipc(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000000c0)={'team_slave_1\x00', {0x2, 0x4e24, @empty}}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='s']) read$FUSE(r4, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r4, &(0x7f0000000880), 0x1000) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000340)={0x17, 0x57, &(0x7f0000000280)="721d5531c03d74cf5a9d74901e40ace678995d9743c91fc9d3deb3c017d5f40972dc21ac294be36515a4f5cfd7fbb3d6841b04d98d75d88ff979ab055743f0e686cc4522d59bc5376df0322bf3a4ea8e7e1c09b83befb1"}) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x63, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x700}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1810}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1902}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x68, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000740)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8080002}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)={0x68, r2, 0x322, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r5, 0x2}}, 0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000780)={0x0, 0x94, "10c9e3c6ccf767f2fb2ac689d9d6598819e257e31ab446f3110946f09b027d1de420ba28f14736bd2058b87638b8b6d61f4c1e5e8b94b1c6d2ca0cfaca153510debc0578d45dba9bd32461459f14c25ce455a972a1f2d034ad413ef479acf4ad9300b8b3be5a02e5cfa7b5e60e170fe7142163996e44236590be1b651919a9734b65e71cc2971620aeee0f4acb23c37555d0102d"}, &(0x7f0000001880)=0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000018c0)={r6, @in={{0x2, 0x4e23, @local}}, 0x100000000, 0x0, 0x1f, 0x5, 0xc7}, 0x98) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r3, &(0x7f0000000340)=[{{r7, r8/1000+10000}, 0x17, 0x2, 0x8}, {{}, 0x5, 0x0, 0x4d}, {{0x77359400}, 0x17, 0x0, 0x40}, {{0x77359400}, 0x17, 0x4}, {{}, 0x0, 0x7}], 0x78) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000001980)={0x3f, {{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}}}, 0x88) 07:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x2c3, 0x100) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000380)=0x1, 0x4) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6c, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x3}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1018}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)='/dev/v4l-subdev#\x00'}, 0x30) getpgid(r1) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) 07:01:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x71, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f643d2f268f3030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c4fcdef33aa41b61692d38f9221c7a05f0ae2fb5244659f45c07f620bd9f923aa38b7f887a301f4e003c4ede37357fd110184d4433baa81201bdd75dc8d0398a6571356e73000072095f5f47214e31da04f42c0f9a6bf9599652ebe5def8"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000000040000000000000015e3bbbc69250cc5f0e559e44b3ca4fe53ee0801ed3f5e7d5cdf55d6a64f891a8652b3337077776bc0781f8ca93876697a5f6248846b0fdf065e393a29d89243af4137f208cbc8cc82c07582a90a38bd3d05af1ec353d635e73690b4059104306749d9114879d6aab9efe6a8"], 0x10) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x5, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000340)={{0x2, 0x1, 0xdc38, 0x20, 0x100000001, 0x7}, 0x86, 0x1, 0x1, 0x5, 0x200, "ea9c056383c6de85784b6db98cca5044fbf8a30d7758e4db8f665df764e1e12ddfd9ca40a742e71a68b9b14a1b62d83a6a508d03bc7695c4ced5db9bf9b379791c05005d5a68bb8ec84c92855e96e74bc591b4385eb2183e2f501e80412eee7950e677b9b6a3e674d7b84eabc80ba4b396d4273125c47860cbc27c40eb11efa6"}) 07:01:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x73, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1810}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000002c0)={0x0, @aes256}) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x6, 0x20000) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000380)={0x0, 0x1, 0x6, [], &(0x7f0000000340)=0x2}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) listen(r2, 0xbc) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="0000010000000000aaa90e414f6464ca91063d95dda85ca050542c2b83e34ebfe47f2b46ee1914799bc3d02808870587f0ac8977418a2e55707e95fbe78e0a15d17539252d6fb48f000570a63eb097a606647069fc06b097b1f70cc2b4becf5d87ba381b492a7d00c414a08c51fa1660fa53a7f7c2ffadf30dca42f8076d3829e79ca010d39766293ed5bbca26c9249e3e6df9200b8cefb0a34e8225597c8804cc5af3"], 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") accept4(r2, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0, 0x0) unshare(0x4000400) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc040564a, &(0x7f00000003c0)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x278100, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0xc028ae92, &(0x7f0000000100)={0x7f, 0x6}) 07:01:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x400000) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0xa0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) r2 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000001880)={0x3e0, 0x0, 0x4, [{{0x4, 0x0, 0x20, 0x2, 0x7f, 0x0, {0x3, 0x0, 0x7f, 0xa5, 0x0, 0x5, 0x100000001, 0x9, 0x1000, 0x4, 0x1, r2, r4, 0x0, 0xfff}}, {0x4, 0xba9, 0xa, 0x0, '/dev/fuse\x00'}}, {{0x2, 0x2, 0x80000000, 0x0, 0x2d, 0xa525, {0x0, 0x4, 0x4, 0x2000000000000000, 0x6, 0x6, 0x7ff, 0x80000000, 0x4, 0x0, 0x3, r2, r4, 0xffffffff, 0x7}}, {0x6, 0x0, 0x8, 0x20, 'group_id'}}, {{0x2, 0x3, 0x100000001, 0xe8, 0x9, 0x0, {0x5, 0x0, 0x7bb0, 0x81, 0x3, 0x3, 0x401, 0x47, 0x80000000, 0x0, 0x1, r3, r4, 0x1ff, 0xfffffffffffffffa}}, {0x1, 0x10001, 0x0, 0x6}}, {{0x3, 0x1, 0x6, 0x2, 0xfffffffffffffffe, 0xd6fc, {0x2, 0x4, 0x800000000000, 0x7fffffff, 0x2, 0x2, 0x1f, 0x0, 0x7, 0x4, 0x8fc4, r3, r4, 0x8, 0x3}}, {0x4, 0x8, 0x11, 0x9b, 'bdev\\nodev##eth1^'}}, {{0x2, 0x1, 0x80, 0x0, 0x1f, 0x10000, {0x6, 0x5, 0xfffffffffffffe00, 0x2, 0x6, 0x700a, 0x0, 0x91, 0x249f, 0xe4c9, 0x6, r3, r4, 0xb0dc, 0x9}}, {0x1, 0x8000, 0x2, 0x1, 'fd'}}, {{0x2, 0x2, 0x7, 0x1, 0xf0, 0x5, {0x6, 0x9, 0x1e17, 0x5, 0x800, 0x2, 0x100000000, 0x0, 0x5, 0x0, 0x80000001, r3, r4, 0xfffffffeffffffff, 0xb0}}, {0x1, 0x5, 0x8, 0xfffffffffffffffb, 'group_id'}}]}, 0x3e0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x74, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1902}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000100)=ANY=[@ANYBLOB="78000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) 07:01:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000005dc0)=[{{&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/201, 0xc9}, {&(0x7f0000000340)=""/161, 0xa1}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000580)=""/85, 0x55}], 0x5, &(0x7f00000002c0)=""/30, 0x1e}, 0xf6}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000004940)=[{&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/169, 0xa9}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/148, 0x94}], 0x4, &(0x7f0000004980)=""/104, 0x68}, 0x8001}, {{&(0x7f0000004a00)=@xdp, 0x80, &(0x7f0000005b00)=[{&(0x7f0000004a80)=""/4096, 0x1000}, {&(0x7f0000005a80)=""/126, 0x7e}], 0x2}, 0x100000000}, {{0x0, 0x0, &(0x7f0000005c80)=[{&(0x7f0000005b40)=""/129, 0x81}, {&(0x7f0000005c00)=""/96, 0x60}], 0x2, &(0x7f0000005cc0)=""/215, 0xd7}, 0xffff}], 0x4, 0x1, &(0x7f0000005ec0)={0x0, 0x1c9c380}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) fanotify_init(0x2, 0x8001) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000005f40)={[{0x19800000000, 0xfffffffffffffffe, 0x1, 0x3ff, 0xff, 0x1000, 0x3, 0x2e3, 0x8, 0x5538, 0xf13, 0x5, 0x3}, {0x20, 0x4, 0x8, 0x5, 0x888, 0x9, 0x8, 0x100000000, 0x3, 0xff, 0x100, 0x5, 0x100000001}, {0x59, 0x187b, 0x2, 0x1966, 0x5, 0x8, 0x4, 0x5, 0x5, 0x1, 0x2, 0x9}], 0x5}) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000005fc0)={&(0x7f00000000c0)=[0x7fff, 0x9], 0x2, 0x8, 0x200, 0xffffffffffff26cf, 0x0, 0x4, {0x1, 0x100000001, 0x540b, 0x100, 0x8, 0x2, 0x605f8d02, 0x6b, 0x7, 0x6, 0x40, 0x200, 0x4000000000000, 0xee1, "d960311cb68b5ccae6ba08e6c19a8171c7ea0b7588390514536139ee2e8ee9bf"}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000005f00)=ANY=[@ANYBLOB="1000000000080001007a12f61da48712a00d2f618cc85ac300000000b200"], 0x10) 07:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7a, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+10000}, {0x77359400}}) unshare(0x4000400) signalfd(r0, &(0x7f0000000000)={0x1}, 0x8) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc040564a, &(0x7f00000003c0)) 07:01:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0xfffffffffffffdf0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x420000, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0x28, 0x99, 0x42e9ebce, 0x1f, &(0x7f0000000040)=""/31, 0x7f, &(0x7f0000000100)=""/127, 0x32, &(0x7f0000000180)=""/50}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000200)={'eql\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x219, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7400}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="df30948b82019da0db4842ba66643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x300, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000000)={0x1, 0x0, {0x4, 0x6, 0x5001, 0x8, 0xb, 0x6, 0x0, 0x3}}) 07:01:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="2cddfff9a10596e5548d0eba86a373"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x40001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000440)={r1, 0x80000001, 0x1, "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"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f023c123f88a070940287dfa04a44f7025df3f6ce71451ec3e5337ea01d950a445a59e1a9fa12e870a621ba252597ff6d9259979449be2069c20f99e6d67cf87aa2f3555d80209935f573190f067bb6076f55613d5480c265207a2921209b83cd38040000007b0809bbc82e8bb97472f5dffc3a6caca03f9090376fa7333188e162e9135f809ba2216a8f4c0733a52e2d2a1542b1bd91a46d6d0480a0858221116f6f31da00000000000000") unshare(0xffffffffffffffff) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000040)={0x1, 0x0, [{0xf, 0x7f, 0x1, 0x735280000000000, 0x8, 0x1, 0x298e}]}) r3 = syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000080)={0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r4 = getpgid(0x0) sched_yield() ptrace(0x4208, r4) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) sendto$unix(r0, &(0x7f0000001480)="ee3da9206049b60d334097af72c305580108ddd8201785fbb407de12c33d6e730861d41036c40062046019bc1e2a8206e81a322fda46dd4b4a9043a7aae53a070df74b91afde74cea7f075fcfd5e051e06102623065d08e4106469bea6543c09de24a0f216745417d04e7db0c4bd46f46ede186402d9674b1ca6d10c9864af47edbafd1ce3f1b4766830d5fe26461d327409ffcaf90a9136c959ad7dd3898beed2bf6d6203af3cba2e7923479501892a80638d3dc4af063ab6070dd44aff414ca133c8c2de9f3b523078ead1295b1bc074325b2c", 0xd4, 0x4004054, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 07:01:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x500, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffff5, 0x7}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x600, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0x584e, 0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(r1, &(0x7f0000009d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009d40)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000009d80)={0x0, @multicast2, @remote}, &(0x7f0000009dc0)=0xc) getpeername$packet(r1, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f000000a040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000a080)={{{@in6=@ipv4={[], [], @local}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f000000a180)=0xe8) getsockname$packet(r1, &(0x7f000000a200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a240)=0x14) getsockname$packet(r1, &(0x7f000000a280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a2c0)=0x14) accept4$packet(r1, &(0x7f000000a340)={0x11, 0x0, 0x0}, &(0x7f000000a380)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f000000a3c0)={'vcan0\x00', 0x0}) getpeername$packet(r1, &(0x7f000000a400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a440)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f000000a480)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f000000a580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000a6c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f000000a700)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f000000a800)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000a840)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f000000a940)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f000000a980)={0x0, @empty, @initdev}, &(0x7f000000a9c0)=0xc) accept$packet(r1, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000bdc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f000000be00)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f000000be40)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f000000bf40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f000000bf80)={'syzkaller1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f000000bfc0)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f000000c0c0)=0xe8) accept$packet(r1, &(0x7f000000c740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000c780)=0x14) getpeername$packet(r1, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f000000d9c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f000000dac0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f000000dec0)={'bridge0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000df00)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f000000e000)=0xe8) accept4$packet(r1, &(0x7f000000e040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000e080)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f000000e940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f000000e900)={&(0x7f000000e0c0)={0x830, r2, 0x301, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xacc}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x134, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0xc4, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r15}, {0x138, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x12c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x8000, 0x3, 0x1f, 0x9}, {0x3, 0x2, 0x9d, 0xff}, {0xb714, 0xed, 0x401, 0x275}, {0x74842210, 0x2d5b1b3a, 0x40, 0x4}, {0xffffffffffffffb9, 0x1, 0x400, 0x1}, {0xfffffffffffffffc, 0x1, 0x3b, 0x1ff}, {0x4, 0x100000000, 0x1, 0x7}, {0x7, 0x100000001, 0x3a67, 0x200}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x288, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7fff, 0x4, 0x9, 0x3ff}, {0xfffffffffffffffc, 0x8, 0x0, 0x7ff}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1f, 0x6, 0x1ff, 0x8}, {0x3, 0xfffffffffffff800, 0x3, 0x1}, {0x8423, 0xaa28, 0x8, 0x1}, {0x7, 0x4, 0x22, 0xffffffff}, {0x6, 0x8, 0x400, 0x10000}, {0x9, 0x7e8e, 0x0, 0x580}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}]}}]}, 0x830}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r29 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r29, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}}) 07:01:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="bcb8371d6fcb2452d4bb2d12381033823128c3963db598a01ea07705e62012a9eab99e908a76c51070b30523846d4965"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @mss={0x2, 0x8}, @sack_perm, @window={0x3, 0x1f, 0x76}, @window={0x3, 0x1, 0x3}, @mss={0x2, 0x60}, @timestamp, @sack_perm], 0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400000, 0x0) 07:01:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x700, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 1: r0 = syz_open_pts(0xffffffffffffff9c, 0x100) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0xc, "c224f94d74f0339a"}, 0xa, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x80000, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) clock_adjtime(0x5, &(0x7f0000000480)={0x6, 0x0, 0x1, 0x5, 0x7, 0xfff, 0x1, 0xca9, 0x7ff, 0x8, 0x3, 0x923b, 0x5, 0x9, 0x13, 0x401, 0x80000001, 0x0, 0x79, 0x5, 0xda2, 0x9ab3, 0xfffffffffffffffb, 0x80000000, 0x739, 0xfffffffffffffffb}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x3, {0xcf}}, 0x18) 07:01:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x800000}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7400}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xa00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x40003fe) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000380)={0x800100f, 0xc48, 0x3}) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x2, 0x0, 0xfffffffffffffffe}}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x404203, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='personality\x00') r6 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1ff, 0x20003) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x80) ioctl$VT_RELDISP(r3, 0x5605) r8 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x1) sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r4, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x41) 07:01:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x101000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x90000006}) 07:01:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xf00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) epoll_create1(0x80002) 07:01:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000004\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1018, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x97) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4001000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xec, r2, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6ea5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @remote, 0x4}}}}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffff1b3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x15f0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x66}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff80000000}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x400000) write$nbd(r4, &(0x7f0000000040)={0x67446698, 0x0, 0x3, 0x2, 0x2, "cc7b"}, 0x12) 07:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f0d516d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dbdc14680fffad5b50a5f1b8e511f9106dc61ff4a2b38dc1a693c6556beb3ba2efdd3a35880c8f5038c640b1f0c66b4735c0e96de90bf5bc779a80b111b7d30571445722f765ed87208336c83d9181e52f778cc817680c63ea9a3fd49e8093592e36273ecfdda53b951b03ab4c7a524af500b8a77438d86e4cc7189bcec69c97391", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000002880), 0x1cd) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1800, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f0000000000)) 07:01:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000580)={0x0, 0x7}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000600)={r3, 0xb4, "4b029849615aee90bc6cc68162c4cfba732296136a7dce55c4c2d494667cb7d517ad38a1c469d6a311494a99c9954bf2e3791cf1dde28a6744080ccd6b5e01ac7f40c0019397d5ad28c81b9714c451acc73f2cf6950b233d77d59574888280c8977aa1589d90412832156d21ac100ec3c8e467bc483e837047e5964ecd47b38fdd9a477a70a5332cf2dde50dcace04ebe6307df9a2a29c4132b960838053044ee3fc3f8e36112c3fbf585d259e570f2720555fc0"}, &(0x7f00000006c0)=0xbc) r4 = getgid() mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x412, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1ff}}], [{@subj_type={'subj_type', 0x3d, 'user_id'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) 07:01:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1810, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x10000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000100)) 07:01:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1902, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x18100000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x200000040003fc) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000140)={0x40, 0x1c, [0x0, 0x523e87a2, 0xfffffffffffffff8, 0x4, 0x100000000, 0x9f6, 0x5f8c1ad]}) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000000)={0x3, 0x3, @stop_pts=0x6}) 07:01:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x2000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @loopback}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@euid_lt={'euid<', r1}}, {@dont_measure='dont_measure'}, {@euid_gt={'euid>', r1}}, {@permit_directio='permit_directio'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@euid_lt={'euid<', r1}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x19020000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x191080, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_int(r1, 0x29, 0xdb, &(0x7f0000000100)=0x4, 0x4) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x20000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x95, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3c00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x9}, 0x8) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3f00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) socket$kcm(0x29, 0x7, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="10000000000000000400000000000000413694d9784ecef290333d461d61df5abbb8abd5bf37fb5608c64cc8d4acb76ab7879ccae6a20be40d03131f8ff0962ce307172a88695ccab2dd8de766ba25f5c16c36b6e8c558616f125df0da464fdb94339d1687dd6148b5c1e8238c8555be70f220f163442d994b8a8e106059cc991e50b392f095dea2f8226a3abc73afdcb047681f20e1d06ede8f88211ae7018cf569d651ced855c0c074f863b4a146ae98"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0xc9e, 0x2, 0x100000001, 0x40]}) write$P9_RSYMLINK(r1, &(0x7f0000000100)={0x14, 0x11, 0x2, {0x80, 0x2}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1a) 07:01:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xb44a630a8a281748, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = add_key(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="e042bc216ecb9611d92c04644031b918d18d4bede2362dcc8b0680dec05bed8a34df77874968f69aac5c6bfff5708ba849fea09ec5d944232014295e0c0a376fca2f0b1cbf2324054f8dcc6533b6b7df5c4e53b229dc8a8ac765c24ca06b1503a482b449c6523a4a78eef450778454fb85c1640345b48441ab4bb26b6bd53c71ef78d7c66fdb858d57c5c42c2025971107cb", 0x92, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, r3) lremovexattr(&(0x7f0000000680)='.\x00', &(0x7f00000005c0)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000400)={0x297, 0x0, 0x4, [{{0x4, 0x0, 0x5, 0x1, 0x0, 0x6, {0x2, 0x7, 0x4, 0xffffffffffff0000, 0xd38, 0x3ff, 0x100000000, 0x0, 0x58, 0x1ff, 0x0, r1, r2, 0x7fffffff}}, {0x3, 0x80000002, 0x0, 0x4, 'proc[-)mime_typemd5sum.#+keyringppp0em0wlan1\x19'}}, {{0x2, 0x2, 0x7, 0xffffffffffffff81, 0x4, 0x0, {0x4, 0x5, 0xfffffffffffffffd, 0x9, 0x8, 0x80000001, 0x136c, 0x2, 0x2, 0x5, 0xa9, r1, r2, 0x100, 0x8}}, {0x6, 0x2, 0x0, 0x40, 'ceph\x00'}}]}, 0x10) 07:01:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x40000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x48000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x100, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0x3ff) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x40000) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000040), &(0x7f0000000100)=0x2) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x10000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080), 0x2) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xc0a, 0x111000) r2 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0xfffffffffffffff8}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000440)={r3, 0xffffffff845e9bd4, 0x20, 0x81f6, 0x396}, &(0x7f0000000480)=0x18) unshare(0x4000400) r4 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r5, 0x200, 0x70bd28, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4005}, 0x20000000) socket$isdn_base(0x22, 0x3, 0x0) r6 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) write$FUSE_GETXATTR(r4, &(0x7f0000000200)={0x18, 0x0, 0x6, {0xb0}}, 0x18) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0x6, [0x7, 0x8b12, 0x7, 0x1, 0x400, 0xffff]}, 0x10) ioctl$VIDIOC_SUBDEV_G_FMT(r6, 0xc040564a, &(0x7f00000003c0)) 07:01:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4700, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x68000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x18100000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="9957b4a97dbfb7b30401514c2b17ca0c4c07a58b88ec9a1e88cc2304c999dba0755f8adfbdb9ae694c32317ca8a4fe917f145285a3d26127b4fac319310f20713598d74c74366c84eb098b197e4cbac1110f28f9dc17f89f56db43b09be1ebae1b3668ce1e960acf47fe3b4c1d073e451f8f4bae1f4635b8ecab4d55113b519e01505b6d040559ff793c4c6fc9c7576d53fb7a99dc90967003191844c4b4b44b1d709d0f4ee863cb9f2532608cf29d9b63b20c59"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x9, 0xffffffffffffff01, 0x0, r0, 0x2}, 0x2c) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20080, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) 07:01:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x200}, 0x4) 07:01:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4800, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x19020000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4c00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x20000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000140)=0x4) read$FUSE(r0, &(0x7f0000002880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x74000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6100, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x2b8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x7e7}, &(0x7f0000000140)=0x8) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f00000000c0)=0x9) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80840, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000000c0)={0x2, 0x0, [{0x7, 0xfffffffffffffe01, 0x835, 0x7, 0x100}, {0x80000004, 0x4, 0x0, 0x0, 0xffff}]}) 07:01:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6300, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x40000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x200) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000100)={0x6, &(0x7f0000000040)=[{0xfffffffffffffff8, 0x0, 0xfffffffffffffff8, 0x55}, {0x100, 0x8, 0x80000001, 0x1}, {0x800, 0xff, 0x3f, 0xffffffffffffffff}, {0x6776, 0x0, 0x3}, {0xfffffffffffffff9, 0x800, 0x5fd1850a, 0x4}, {0x80, 0x0, 0x4, 0x9}]}) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x48000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x85ffffff}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f0200000000621d00") unshare(0x4000400) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6800, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x18) socket$inet_udplite(0x2, 0x2, 0x88) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) 07:01:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000000000000004000000000000005835ae5c14957d1766bf82dc55ed31f0571b6289caa1e9102dce71160a9e36b374cd5e3f9f723531d457e43a0b0ed19b3c1f6e332fe722f8c4af49c6665b63be14d1126e5986"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6c00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x7, "5ec13e3d9eaf7b8eec0d36"}, 0xd, 0x3) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xfffffdce, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4a6000, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x200, 0x1000}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=r2, &(0x7f0000000480)=0x4) 07:01:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x68000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xffffff85}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7100, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x5, 0xfffffffffffffeff, 0x8}, &(0x7f0000000100)=0x10) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r2, &(0x7f0000000280)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @remote}}, 0xfffffffffffffffa, 0x40}, &(0x7f0000000200)=0x90) unshare(0x4000400) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7300, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x20800) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") unshare(0x4000400) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x13f, 0xf}}, 0x20) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x111400, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x100000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x200000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 0: prctl$PR_SET_FP_MODE(0x2d, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x3f, 0x7}]}, 0xc, 0x1) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x74000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f023c123f3188a0701f823d57a50399737e7768403d59a916c64338240a40b7b8b05c0a723728bbe8dc46c735e096636091cc6b8c16dd8dcabd484df8f3ff8307acc60956cdbaaa4a5677b19fe43c3448c91c91a71c45c2029924c113bcdc9782dc6828b7798151bf7cac12895b015e0b6687a67d81c6c7fcf87a96b35fb0b4f75f2fe705e08bd869e1") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x240100, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000001c0)=0x800) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000000)={0x7, &(0x7f0000000100)="3cdbeb97380237f99d2ba6a58827ce1c23b7d871d5fa5b6e2a5eff1ddf03e917482e2b8b0829d36e48e5e85622a9f6640ef417dce796aa8571dd2f8b5ed07e2e30239e3b5eec253e0e6f61eacbabe124832cb56dd9ed57ad63eb0fc00093e340e07ad2af148e8f83361e6adc01c4b28597ef3d6b09a7b9365164f294422616450499bd135c984e5413c6002bb15fbf24c2fc0848261da6b25089679ae0062ddbd37fc63a3c667f18345a3158dae96c"}) 07:01:47 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7a00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000000340)=""/144, 0x90}, {&(0x7f0000000500)=""/195, 0xc3}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000600)=""/198, 0xc6}, {&(0x7f0000000700)=""/167, 0xa7}, {&(0x7f0000002880)=""/253, 0xfd}, {&(0x7f0000002980)=""/251, 0xfb}, {&(0x7f0000002a80)=""/148, 0x94}, {&(0x7f00000001c0)=""/90, 0x5a}], 0x9, &(0x7f00000007c0)=""/105, 0x69}, 0x10100) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000480)=0x4) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x300000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r0, 0x80000) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x50000000) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f0000000100)={0x100000000000000, 0x0, {0x0, 0x0, 0x100f, 0x0, 0x0, 0x0, 0x10000001, 0x1}}) 07:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x85ffffff}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xff00, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x800) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000340)={0x0, @reserved}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0af696c56f8c861121ab8428d61f77d5e1efe95eec48d8db0800000000000000fb") exit(0xde) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xe33e, 0x0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000000c0)={0x2870f60fca62a832, 0x2, &(0x7f0000000440)="ffb2a16dcb310dc6fad53e3fde89528b3b38de740b772641ca0fa21958fda9af02bea82b2dd84c241a131e8d002e2a6c810b46b7a12dd7866ff840632866ecab1ff4b42ab07fd2938fdd4e80f5c1a9fdcb37c89e4159ab6e7e3fb2a3f96aaa926d6215f66f0fb1556163fc6dc4f6199828ff52937161794431060c49467a2dc538dbbfbfa88b2c4dce33283f98035b7a67634767ea71ba4a2308e694fe07e88cb667f112f4fd38be9afdbdc66a3b5bd9ccb9f1a4ec16f6a3287475117a9c062b60ce9ed2e46df69241d3af1d1a3c41f3f62e2bae4be6db4ae01cc768c0bb7ef8bb9ae25536d48c78da143e7ca7c15f0ad41bd3a1acfede456f4daaab9954169855ed4c35a4e7247f7bc126a96e003f1f3f905abeb38e34a7eabce8fb1c750c2ef365ef58f55c36a3eedc99fe1ab6080f37a83c29f2f5d5449eb0c77d3db5268a9c681027437a96b9c379f51996938c2d779364770d177a8bf3cad2c08951d155d4166ed17d9d3b64eeeda14b3eb4558c5302e469d1b5fa39151de6fc670dd9e880f47a415c886e87b9e94d4eb2c5e5b3a07534912e500a499bba44aa081cfce32d77151ddc3a851efa024fcba7a137e098051dca73e56c0878e2ab6dda69a647cfc7dcfd0a6a46d1ff12fccb7b44cc99c401d076aea8d48fda7a3ed7a515dd6afef69984343ad98b568aaebdff852a0a7fcdbb8dd95f713cdc08cbf64ce6c18b51144c205625ced3ab619a4bf0eef9573a17e2aabe17a6bbd8f3d8c976e37e050bb0819782372a1849483cecc163d59b9e107308fc91f184ab8aedf7fd93beb857c177ad3d7a1cd5f6554b988c2944098004524d026c7da64088abc10fecb58be019012fa91add7460320ab14adbdc0c8db38b7949a3df05749007f949e863574bfb2e12411dd9154d33aae62b927a5af3c7ac1c6f340fdd7ffa4d75b59f7104a8559fe51001e49a27e93a396bb119c81af516577687a9035daca649355134a543aefb8cda243bce6b754f7064f301cf46225b4e5f83af77d80b5c4345a809057583c17801dbf6a2c203b9d7db019044ce465d84f6ef85fd943c1eacc5e812e17271e0b08b121d0c399acf3631a7c08e4442b839364cc8f748207215e7f61a5925d8eac718b5aae88e8711f206b8d77534375ecc7e5e810b3411b1fda73f5c90358066aadc880acc99e90695b85c9d93d32a6224ac1bbf8c23a101e5eca3c19af6cd3af63526ecf96767321ac14e0cf51c3bd7b5beddc2c831492d2626570ad0727d0b81d68046cde20d8e22b052f89aff87252107166278c615b1e89b521c16c304eeef9605edd3577513e30841cce9980ccdacfc8b8cd764faaac48b3c07eddf89c793f4b2ec97f1fff8e4fd8ade87a82817cc41d55e50eb5172b77e3ddc82c4c163b7d7cd0a6961255a0e092a5caa7aaa14efc80c25915d07adc1f3d8e5bdbce3643abf7b0d80ffe407c64efdc8aae68f3c5396f81a96eee508aaa0d8ee90562140c2a37d1dc70a45ebee59b490de5bf54f986fed448462cd5fb608e323d56bcdbb920757e9d795e3ceb182d14adb5ef10e3f094dc4e7d464e0537c7ae7efa7204ab8497aef6aedbeecf1d3e6fafcb2d977f90edbe1c4ed4031a9fe405417a69ed25aece9f50b116d35ee8afbf2a9e0e6860713c804f257d0058bb56f0a4f5b7735629b23ec58ce11ad3e11e05b9d1a1552f05c14ac2e5c033623d0becdad02993c76c7da00ec096eabf4a0684995a16a031037d3b76028f8f941cd60e12982d63a59ea1beaac8496389e4af898cf4970ddd2ebe7ab8a63ae9a0fad7a2f0500198f25f1ada64c7b984018720da000b3d33adbc2687e6b2da52d3c1783a20b59e21b1678d1c6860b3d556c9ea2a735b2b16f9f4653f5f5d36689319663ba06611c6e5174668f07881ba43bb89827f11bc952b1818d547d14b48f949994b2bc4c3fa29a522659fe81a49b11fa3d092c32605981051271378b5fd3d4e8ee4020d59ca090aeb8c3704cfe323761d5b5884e046b50b86ef42a1dc26adc2ee68c2829469063901d949ddc5e66bee85203dd79be9ce17d5aaf10f9cff69ae1d37b526a550c8717480e13968e1df872dcb4eae8d94efa5389a331363795d24baa38bb13acebda907ea19a6eb71aa993c5fbe1b1a7f741704c93b0c2357ed4f0670e5bd4386074d8d9ba02ff7792a3517a63c811cdc68cb07d840b46255ccc5579fb80897a662f8dae006f6a258a2bc7f60a4a3471ae5debd722b2d87ef5d3a97a246bf61668476d51bc571b2d74925cf30e34b0760c375e99f7ed0e35dc97139d56e4d48004112d8e0d54611b7ade91623f984c889338936cbc48e3894e3be9e9ce604d7223fcff23da7c7d764d2d8879cc9b1624350f7df33d253dacb53b1a84ab21560a9673a8a145890dec74edad79c1eb1938869ab155046902bcb1e338cf42abfdc477e55c6cc59ccee6c0ca80dbcf2d2be24e1a62f90dfb53c7371c39c6f45a89bb343be34995b49f6b261fce3e5319a199b4fea29571f86b7342d0199d145659e60a93645da561c2707390b54b0429702629bc8884071705369b62611f2766614e448d66b06a8e7af21afd359e0f9cea8d8b9e03450f28686366588ca81f8d216eca9878d684a649101c3fcb414a6edcd4e9542e18db2005b63d220d8cf80e4e3f9bfde405e572854f4e4ea5b49e09b70f5bc67aabf93afa8f589261346e987b689f0b0959f3c88639f5ecdd911e8111bd126a4ff519ade206a8e490427f2eb88476a9760dfac540e1e76dd44276c7eaa8bc1800fd1f593e9c800e8260350e2abbd3d9c10a53850d9eceac2042fc740b57467cf8cea451fca2baa9b8c0fba5cacb72fcd226695af986ff98f1ef4e435ef40ceca9d773b2770a4854055b667d6032fd441c37334d57d1312a231c7b8e15f5c887ee136d9e31b80a5563319e6e7e7dae400597989ea5232f0d3f16091040b04898160ae2a0c60fc465a76e5a2248d6671b1ca4df7ddf830df91d8789d13519af3be50c8646dcc7e50ca6da9d1ea63c49c22de91adb9797598e9c71540adc14cb4c7b69102c98e21ca3c8a03427841e3ee8757b1b646085ba1f886c7fa20929c58be32c0ccb477b0d9f6702fd15977a047fbb0c4c34db569804d89e772fa5c5bcd4436dfa08fa1d79fa0b2a264b47eebae9a70d528175b97b1270c1f98296bdf366457e53370f5cdab896eea249e72f5345a0d24a21c84acf4222855c11caffdbf0f0104ca606aec2191d9d10a44ef567b48eef61809eebf7f6cec74680b6e7cdae9920a0350a08b469fa65c779538cdb24f4b4b03c85f2838b30335fca50cc9711391292ec66dc3f69d4347092cb74ec2ce1acbe810cec2e92a4fb87fcbcfdd50ab18d9d4af02253269732dee3b840ad14988a6e48b650579a58ab030e45d0f9d2463500201232fabbaec4d7b65820a232fde5f88b1eb2df5142d73c1eb50fbc412d84a483c8c6dd46c7a8faa111d4c23e6167d355dc63bbd8e1b170d9ea81ce3398972c51eb1879a590d1adc56f40c3a0d928e08058486c1fafa934de5aa2b53494a1484c10cd4bdc47df5a74ea35c9fdc03846d9700449b849b470b407f999a33ab97f2c27702f6085a2b4159640a851fdead58d88ee1c965c9464fb4d0a0e68b2ad48a01d1ef97a5603d5713c89c08eb9eda6aed4d9b5d5acf6d9d2d09909d3f29805acdf3f9b3c4c2cd82996c3c96a37a36c8b73657531582377cf87d7609504555e358b544134ee0a79e82fb942f242e4dbf41b214d774212c1f3d880c79b2806299f01c1a5bbccf71a828bf410fe69dfd3a54342403ad2b7d51767a1b8b83cdf86be9ae31787bf9cfa85f51d2bd9e60d018406d5c0fbcd517930bbc00fa84be8adb01dc17062b37ed017153343fc1cb273c3e945a71517e5dc89da3a8d3e0aea55786274ec35bfe3d1b9fc998b2ab0b005a8d2caecd449c682649eb0c0ad2acc048e547da4b0ba46ca072e0c7954b086ee5b83c07407fffcd159da5215ebbff7f3d0aa02e927c183dfabea07f3b576042ebe5998316a3c50866b2f30f0060c0c24b50bae914bc34e40c00124dfa9a53db9cdf6af82bec1a83ea32871b3b97a844a733a357f93ce69c8c5c5ef8cef8466d5fc21834a0ffb348b2fd0fc67db12e319e6fdd08b48dc0a8c147fb3a5bb4fd843ae92844cd6ef2bc16b4e22054a10fbcb398283ab156e424aa08b53ce9a65fb6192aac975bc824799b682cb27dc668357f1a65afc572eab34317068d5a832b9306400755cc80db68c16e70f058a321dd285f6e40055daee9b34a97c6d8b240276742a42c52e0dfb0286c8b8dab8af5433cd6fb011b47c4368933961ef2214fe21e0f1105685612b1fb489fd3f12ebdcd8d973fc6605d9acc2419a9ef3ef14a0774b18162198d1f661394ea03c8856be513f8ba575784a96c470a1f92db03f53e595ba5466db00340247ba9bc81a622569e13d2610086076bed5e3d1c3b0a45011d36156ccdb27336415d0d3573f9dcd06f31b1bfea013d1a6c7b9908a20c9b991eebfb2a5373eb6dc5cae89879854548523ee2dc19802c754572e188d3dee7d873e9ff8b50438e612d278ece8d2efc331ede6ebfe64c7fc30c86fc4bd6ac042777313f4d13f6aef9f0db23703fdaf5b593225a53028c02838180af80d6e6a05c316c8371ed20daf0503d66235aa6aabc0105742c985cb0780f7a3f392c1c6b0d839a32fabdf05f674235449093a0ac2ae3ea261720904324335e7cdfa5cc45ea0c21e1b127debb5359c7b27ddfdda6a18dabf054be17ba2af5dd2d9caec385c67240a7779be3fccfb632062a6587d43e139125e042121ca3b315434ef78a15180eda2b22e0f0432cf9827f9bd83a89820bbd54a7d8e5e06de4f1dc489cd44cb8b608b4d853af1993cd6f7a997962ced6e9d9c51fe69867f77de818d322cd50d227cd271ec8341416b7cc9e1d107c138f0c1741e8c836d00acd7c104db6d39c5c0527031fbf999522b00c4d6a0d04dda2875439e3cad49f6041fc157f353d5f20aebb7717b1f538193873b0f431e69353f4699744c8c1558509156a4fd9aa5cc3d6bdacdfe4ccc65bd03c3cbd0f9441da27f949f86da8b3a27e48b29f13bf43b26aeb3ff2a80c091482a45ed572c7997e496a61f70ed6c86eadf18e9b2020050de431c853358dc7d297816ad927a416c2ad6d41b2cf502a75f34c41084bb569f24d34a69e4664c417fc52e9346db54792af4ea08b807bbc77369371be8d12320e339d2f7e24f84bf402cef5a4cdf8b950b170501c6d0d1b50adecf255ad6ea128229f1022cfe9d89c7317a49a795513fef60a2e2794df9ff164e4e8d927657d20b511741fab4b7d1167cab1843783a3fb8dc6d6ed20eca3f1ae5904ff76989dfc8e828e9d67b642653b2a848f047a75a15f91978097ee7a8d8c19fc84d319bf174df3e4e788572272ac87e3f77ec5dd6b92457d831c648fc2d2dc78035903bbc91b57465def1c92a47da1c8f26a0974d6d4b54e428eaa8f9a95323525bc1323caeadcec4f27d9d728ac0424d931dadc1613585e50aff605d75cc6ca86e582a1aa6cd057ffa31eb76cbb47dcd4a8f7d04dec635bc72e8989077679229ef0b3af43c490ffd86a3bcf063ef911419c23c3cfba33e1ed85ef1341d1306ba47853cf3b9158e7fc0059ccc192b41767dd81acb4c9587f5244ec9d9ba1b6569c249e6d22d9212d0f17e7fc9983e480b103b0e778ee19c95cf58bb9521344034e58744c5a04429f3a9c3a70715118f27e62457f87c653a26525cfbdb05d4", {0x8, 0x101, 0x755f565d, 0xf670b6cf9d5725b0, 0x8, 0x5, 0xf, 0x20}}) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x91, 0x1fffd) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xe0b) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)={0xfffffffffffffffc, 0x0, {0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 07:01:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x100000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x500000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xffffff85}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x600000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x700000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 5: syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x20000) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x60457175d8d8c824, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0xfffffffffffffffc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="40362bc7b9887ff93ef29e3a932e8d72c0b6ab7077180d4f9d782d923b021480ea2c97a2de257d0b02ce145007fa5b85ca138502a26da85d21cfdf0ea42b359f9aced33ed1095284bc"]) read$FUSE(r1, &(0x7f0000002880), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000880), 0x1000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000500)={0x200, 0x0, 0x4, [{{0x1, 0x1, 0x1e2, 0x5, 0x7fff, 0x7, {0x3, 0x1, 0x7, 0x0, 0x5, 0x3, 0x80, 0x1, 0xd07a, 0x3, 0x1, r3, r4, 0x81}}, {0x2, 0x10000, 0x3, 0x101, '^^*'}}, {{0x6, 0x2, 0x1, 0x400, 0x4, 0x100000001, {0x3, 0x1, 0x6, 0xa0000, 0x7, 0x1, 0x400, 0xfff, 0x5, 0x20000000000000, 0x0, r3, r4, 0x2, 0x7}}, {0x1, 0x5, 0xa, 0x200, '/dev/fuse\x00'}}, {{0x6, 0x1, 0x8, 0x80000000, 0x1f, 0x8000, {0x4, 0x6, 0xfffffffffffff001, 0x7, 0x3f, 0x80000000, 0x0, 0x5, 0xb2, 0x3, 0x8, r3, r4, 0x6, 0xb9}}, {0x6, 0x0, 0xa, 0x3, '/dev/null\x00'}}]}, 0x200) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="1619131a7f172872760adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x68, r2, 0x601, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x100, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4090}, 0x8884) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x2000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00009190708aafc88c3f9ce0a3d18386aab18d04673ec996ddc43d3334b7cdce99cd3082a99233b6d47d048fe36b6afb09109e022f01c7a3c0d516c74a2f2bc4ca9c5a"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000000000000000000"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x100000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x200000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x44441, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @remote}}, [0x4, 0x6, 0x4, 0x800, 0x2, 0x4, 0x1, 0xffffffffffffff06, 0x5, 0xc0, 0x7fff, 0x0, 0x7, 0x7, 0x81]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0xd4c3}, 0x8) 07:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x1, 0x0, 0x4}, 0xfa) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 07:01:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x300000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1810000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x5000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) r3 = syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x5, 0x80000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x9, 0x3, 0x1, 0x3, 0x1}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000004c0)={r4, @in6={{0xa, 0x4e23, 0x24bc2f1d, @local, 0xfffffffffffffffc}}, [0xffff, 0x4, 0xffffffffffffffc1, 0x8000, 0xcf, 0x6, 0x3, 0x0, 0x80000001, 0x5, 0x80000000, 0xa7, 0x6, 0x36af, 0x3]}, &(0x7f00000005c0)=0x100) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) setsockopt$inet6_int(r5, 0x29, 0x1a, &(0x7f00000001c0)=0xdf8, 0x4) bind$inet6(r5, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="e58a9c8578dbc3e816f2dd50c34f10000000000000000400000000000000287f66b6a377e1ac0d71e16171f7c73b71e371b1252ac3f0865ff6b910a7c1bad3d4a5bc4803bcbfad3e9e1d13aa9c497870609cfb0ebc6c445ca3617ec042a19aa898f9ca1b65bda81bee3cd2f7bcc17b762f30846890ede82de3948bf8fd8b1498bcab4a05ef3381875ee364c700000000000000000000000000000000"], 0x10) r6 = fcntl$dupfd(r0, 0x406, r0) ioctl$DRM_IOCTL_AGP_ENABLE(r6, 0x40086432, &(0x7f0000000080)=0x40) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x1, 0xa3b8}, {0x5, 0x9}]}, 0x14, 0x2) 07:01:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x8000, 0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x800, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x7, 0xffffffffffff9dd1}, &(0x7f0000000140)=0x8) 07:01:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1902000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000140)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x8, 0x16, 0x5, 0x0, "45fd21acb0970cb66c51c19699a0c42f00b6811fdd2b4510a3108314334a7ad3"}) unshare(0x4000400) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) 07:01:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x500000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x4, 0x1f, [], &(0x7f0000000200)}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/85) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000001c0)=0xd1c) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390040ef7500008fda0800000000ad77ffc6d8295e2f4a0b018e22babee0a14f86a90fd0c35594068a5355ba6110c3c8361759c3b2e1d6e2bf"], 0x39) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000440)={{0x7, 0x6, 0x442, 0x10001, 'syz0\x00', 0x3}, 0x6, 0x200, 0x8, r3, 0x4, 0xfff, 'syz0\x00', &(0x7f0000000040)=['^lo\'[!+)#-\x00', '/dev/hwrng\x00', '/dev/v4l-subdev#\x00', '/dev/hwrng\x00'], 0x32, [], [0x4f, 0x0, 0x319b, 0x725]}) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r3, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x1, 0x0, 0x3, 0x10000000000}}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0x3, 0x80000001}) 07:01:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x9, 0x2100) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f00000000c0)={0x1, 0xc}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0xffffffffffffff66, 0x0, 0x3}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:49 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x741480) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r1, 0xc4, 0x30}, &(0x7f0000000180)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfffffffffffffc01, 0x2000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="03"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)={0x28, 0x4, 0x0, {0x4, 0xfffffffffffffff7}}, 0x28) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000002e40)='/dev/audio#\x00', 0x7fff, 0x400080) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002e80)={0x0, @in6={{0xa, 0x4e24, 0x8de, @mcast2, 0x6}}, [0x1, 0xbe, 0x3, 0x6, 0x200, 0x9, 0x7, 0x380, 0x1, 0x2, 0x60000, 0x1, 0x1, 0x10000, 0x78]}, &(0x7f0000002f80)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000002fc0)={r3, 0x98, 0x20, 0x9, 0x2}, &(0x7f0000003000)=0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=""/7, 0x7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r4, 0x4) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x600000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xa000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000040)={0x7fff, 0x0, 0x2011, 0x8, 0x21, {0x8, 0x8}}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x20) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000140)=0x2) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x700000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xf000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = userfaultfd(0x80000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x4, 0x0, 0x8}}, 0x28) 07:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="726e75715f698d3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xa00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x10000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7, 0x10, 0x9, 0x1ff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0xbc, &(0x7f0000000340)=[@in6={0xa, 0x4e20, 0x100, @mcast1, 0x8}, @in6={0xa, 0x4e24, 0x9, @rand_addr="4dbb3ff70135455af83dc1130de7aa17", 0x2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x7, @mcast2, 0xfffffffffffffffb}, @in6={0xa, 0x4e20, 0x2, @empty, 0x9}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x0, @rand_addr="72efe27cfac1935930756f6fbff9f5ad", 0x2}]}, &(0x7f00000001c0)=0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000600)={&(0x7f0000000200), 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0xcc, r3, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0xcc}}, 0x24000000) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x91, 0x3fffffffffffd) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffffd}}) socket$nl_generic(0x10, 0x3, 0x10) 07:01:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000002880), 0x1000) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '&posix_acl_access%wlan0\x00'}) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x44) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)=0x1e6) ioctl$RTC_UIE_OFF(r1, 0x7004) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x18000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x2ffffffc) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) r3 = gettid() syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/ipc\x00') times(&(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x59, 0xfa00, {r4, 0x104}}, 0x4aeb3e35493ee376) 07:01:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1810000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x18100000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x1902000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:53 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200000, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ashmem\x00', 0x424201, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/btrfs-control\x00', 0x80400, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000600)='/dev/binder#\x00', 0x0, 0x802) r4 = perf_event_open$cgroup(&(0x7f0000000640)={0x5, 0x70, 0x37, 0x5, 0x1, 0xc00000000, 0x0, 0x1, 0xc0, 0x1, 0xfd, 0xc62, 0x4, 0x0, 0x98d1, 0x3, 0x3, 0x1, 0x9, 0x25, 0x1, 0x81, 0x1, 0x80000000000000, 0xfffffffffffffff8, 0x5, 0xe0, 0x5, 0x44624ef6, 0x1, 0xfee, 0x7fffffff, 0x44811afb, 0x1000, 0x6, 0x0, 0x0, 0x20, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffff, 0x20}, 0x20000, 0x5, 0xc4, 0x0, 0x1, 0x8000000000001, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x6) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x1, 0x0) r6 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000700)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000740)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) getgroups(0x3, &(0x7f00000008c0)=[0x0, 0xee00, 0xee00]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000009c0)=0x0, &(0x7f0000000a00), &(0x7f0000000a40)) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000001c0)="073ba1c2beaec57f385b5bf0bb2661ac833698aeec8f2c4fa05b9cf24a870826623f7d5dc782937f92a19b15b3ef6dd924369681faa0df53286be8d3455966838027fce1e06ed19ecfb46f6f2bd67d9bfca9c1ec9659a3c3e0b88a3c708c59db766b6e97ec9cb6d162638eee772744fa853889ba12e9b404332f4c9bd5838b5fa70def757264bd926d15a8d4933da14346920a0c09140db29280", 0x9a}, {&(0x7f0000000280)="641bf6c4ad0b4c67afa2ecb9cf22d0f1e1b3708bebc9339856efe907cefa836b3cc31082f0433ef266e495cc165b92ddfbebd4c7017df5f7f2c3aa32e52be746eb98a864defab72b5503c7e6c28faddf070620aef7fddde9e0dcf75d197f262a38cd1a22e31a8493fa95dfd5a6549ac6e6df818d3dfd209bad437231b6a3bac021b598318bcce00cb3db8f3454c82bece689f35125e0ef4ad4c571d3e9ed7b2dad639440b232b452afe8bcde537b32bb75e17b4113fa27ca94184e9485a32ffbf05c5045d9110188daa9c51e32263a86e47a3266d977d0a3a32eb529b2bad083d6e1c370572a9355e69c7cf3dfdab88d5ea1de", 0xf3}, {&(0x7f0000000440)="91f55f8c2651d4912cc8fe2f740fbf9ee45a4f125f10931ee3ea66282ff0c7c91915834de6281b5e7ee05cc11d24893aafcc3482c4970bc1bbb8cad038c58a3febf38846f309b13ad9d22bdbc3ee9ea0c2a1aa273eecf173f8", 0x59}], 0x3, &(0x7f0000000a80)=[@rights={0x28, 0x1, 0x1, [r1, r2, r3, r4, r5, r6]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x68, 0x40}, 0x880) socket$inet(0x2, 0x800, 0x100000000) r13 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000500), 0x80000) ioctl(r13, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r14 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x42000, 0x0) connect$vsock_stream(r14, &(0x7f0000000040)={0x28, 0x0, 0xffffffff}, 0x10) unshare(0x4000400) r15 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r15, 0xc040564a, &(0x7f00000003c0)) 07:01:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:01:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x19020000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x18000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) 07:01:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x2000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x20000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000001c0)={0x6, 0x101, 0x0, 0x1ff, 0xffffffffffffff7f, 0x55b}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x3f00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffb, 0x20000) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'nlmon0\x00', r3}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000002c0)) ioctl$TIOCNXCL(r1, 0x540d) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000200)=@req={0x28, &(0x7f00000001c0)={'bond_slave_1\x00', @ifru_hwaddr=@broadcast}}) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x10) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x4, r3, 0xa, r1}, 0x10) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000180)={0x3, 0x1, [0x3, 0x3, 0x9, 0x8000, 0xffffffff80000001, 0x1, 0x400, 0x4]}) 07:01:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3c000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x30700) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000005c0)='\x00', &(0x7f0000000600)='vmnet0:!keyringwlan0ppp0nodev\x00'], &(0x7f00000007c0)=[&(0x7f0000000680)='vmnet0wlan1cpusetsystem[\x00', &(0x7f00000006c0)='filter\x00', &(0x7f0000000700)='wlan1ppp1wlan1selinux\\.\x00', &(0x7f0000000740)='-$\x00', &(0x7f0000000780)='user_id']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) acct(&(0x7f0000000140)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x10, 0xfffffffffffffffe, 0x4}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x700de88bb1d953ac, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x4, 0xfd, [], 0x9, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000480)=""/253}, &(0x7f00000000c0)=0x78) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) 07:01:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x44000) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f00000001c0)={0x0, {0x7, 0x3, 0x3, 0xb69}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f00000000c0)={0x4, 0xf001}) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3f000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x40000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'team0\x00'}, 0x18) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x1, 0xffffffffffffe025, 0x1}) 07:01:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x0, @local, 0x80}}, 0xa15, 0xac7, 0x3, 0xc851, 0x40}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x3ff}, &(0x7f00000001c0)=0x8) 07:01:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x47000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x0) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x4c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) recvfrom$inet(r1, &(0x7f0000000340)=""/150, 0x96, 0x40000000, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) r2 = fcntl$getown(r1, 0x9) ptrace$peek(0x1, r2, &(0x7f0000000140)) read$FUSE(r0, &(0x7f00000050c0), 0x345) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x48000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x343000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)=""/175, 0xaf}, {&(0x7f0000000240)=""/87, 0x57}], 0x2, &(0x7f00000002c0)=""/138, 0x8a}, 0x102) recvmsg(r1, &(0x7f0000001680)={&(0x7f0000000540)=@l2, 0x80, &(0x7f00000015c0)=[{&(0x7f00000005c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001600)=""/87, 0x57}, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000440)=""/228) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="62f565a7f198d24aa5007138db779dbab803da1b2de05e95600e42b6742a283b739b8f4573b1e91f8ce7934d4b730f7635e35c11e00aa294d483812c275734e3c8f1aded91456d8658166900e699587f47626f1d862e305454b6a4042604c9bc05a4d00f1236e71fd12fbfdf570eb5ead69bfb1945f960f39b5d39839395e457b58e2c164ca3d0ecddafec5ae869c6976413b3b94799aa465b7f86899c4be30a7e9d42ea3422b340dc7d821db9af0781c90e44f8879db715a81123229c0a"]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x85, 0x200800) r1 = socket$inet6(0xa, 0x2, 0x4) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x8200, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x0, @rand_addr="6f3314cfb3a5adefb2ee991495988d43", 0x8001}}, 0x589a, 0x1ff, 0x2, 0x7fff, 0x11}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x8, 0x20}, &(0x7f0000000200)=0xc) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xfffffffffffffff4) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="10000000000000040000000000000000c7a80c80babf0eba9b5d677165a08d8346150bb662b7d6d71d7f752dc24fa4628c881f839540852a6b09d154987f7baff6aa58aa5e934241218d2204fe49f5c3672787440270442cd3b2d9f325f55744323c59ab"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x5}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4c000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) readlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=""/52, 0x34) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x61000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="a5ef88", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x4, 0x4}, 0xfffffd43) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x181000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0xf4, r2, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3af4335e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @empty, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x63000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x68000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c01646fad39892adc4c6f64653d3030303030303030102c75736572", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffff9c}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000001c0)={{0xbf, @multicast1, 0x4e21, 0x4, 'nq\x00', 0x1d, 0x1, 0x5d}, {@loopback, 0x4e20, 0x3, 0x10f, 0xfffffffffffffffd, 0x7}}, 0x44) read$FUSE(r0, &(0x7f0000002880), 0xe4) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)={0xfffffffffffffee4, 0x8000000, 0x4}, 0x10) 07:01:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x10}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @rand_addr=0xe8c6}, 0x88, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7fff, 0x1, 0x9}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:01:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6c000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x48}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x1, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0x9, [@local, @remote, @local, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote, @local]}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, 0x6}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x5d}}, 0x10) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x71000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="100000fbffffffff0300000000000000"], 0x10) 07:01:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x68}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x73000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f0000000000)={0x4, 0x0, {0x0, 0x0, 0x3008, 0x0, 0xf, 0x0, 0xfffffffffffffffe, 0x6}}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/252) 07:01:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "30b13ed30e6a00b6ef254339024db1f4"}, 0x11, 0x3) 07:01:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x74000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x74}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) getrlimit(0xf, &(0x7f0000000040)) keyctl$session_to_parent(0x12) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x30000) write$UHID_INPUT(r2, &(0x7f0000000440)={0x8, "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", 0x1000}, 0x1006) 07:01:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d8de4fd88e991e5cd961c73703e74e917a755db6bb53921b1c99f25893eb06df9d7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000100)=0x6e) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:01:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7a000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:58 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000340)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0xa, 0x6, 0x1, 0x954, '\x00', 0x9701}, 0x4, 0x8, 0x4, r1, 0x6, 0x9, 'syz1\x00', &(0x7f0000000180)=['/dev/v4l-subdev#\x00', '%\x00', '/cgroup\x00', 'eth0em0eth0\x00', '/dev/vcs\x00', 'keyringeth0nodev\x00'], 0x41, [], [0x7, 0xfffffffffffffffd, 0x7fffffff, 0x5]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'veth0_to_team\x00', 0x2a01}) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc040564a, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x7fff, 0x4) 07:01:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x85ffffff, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x219}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x5}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r2 = gettid() r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r3, r0, 0x40}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x4, @random="16e9b9ad1712", 'veth1\x00'}}, 0x1e) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:01:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='Fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1c4, 0x400000) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x40}}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 07:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000100)="d35c55c6cd41f3f7aa3865b777402828d2731f3a5f86bbd2673e19ad290be4fdcc46044401e316ca0c01fc0b5fa6666ad01db0f6f9f1db724c11de3cc5a86f1843a28ff54d0f36b889905033d48c97f1f40f216420340796b283fddbef417683a336043c834c66fdb305a249543d61d0816acdb5679394fa49b2cfa7223a176aee4649f55a350258ffadd81a6e16c116d921483bc4ddba0e52f61f671e72cee8fc04160b4cd893e710e5ff2b374779c6da389191c1763e31c5cf"}) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x2, {0x4, 0xfffffffffffffffe, 0x1, 0xfffffffffffffff8}}) 07:01:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="ac9d33d2bb52b7fcd25ceb8dd34c0c00"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x9c000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000000c0)={0x1f, 0xc, [0x100000000, 0x7fff, 0x2]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x9cffffff, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x300}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180)=0x4, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000040)={0x1, 0xc000c, "2a5eac893be446b1c7daa3ca384be924731ab38668aef677", {0x20, 0xffffffff}, 0x8000}) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000001c0)={0x20, 0x10, &(0x7f0000000440)="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", {0x4, 0x7d41, 0x32314d54, 0x0, 0x7, 0x3f, 0x0, 0xea2}}) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x101000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000140)={0x101}, 0x4) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:01:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x3f, @rand_addr=0x401, 0x4e22, 0x2, 'dh\x00', 0x6, 0x2, 0x4b}, 0x2c) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200000) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="8ee33ff4730000000000000000000000b65a37a3b3f75fdecaed35e12e25be00cda0b8858321ef15ee8ed3850c05b69f46a95f97e321ea3efbe2f0727941808ff3c83954cf8f1533e80d730866e41f0d260f983271ce44404836cde0d047864dac560e013d7e927236fa581e533feb155ee50c047766e094573f538173617fea16975b51222be6185126cfe78a57e79e1960f91a82c98bae68c964573058e6dd7fbb37834ef45ef7aea7ef012a3d0afac015d6f4"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0xfffffffffffffe70, 0x0, 0x1}, 0x100000305) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x40000, 0x4}, 0x10) 07:01:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x9fffffff, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000480)='./file0\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000240)=0x1c, 0x80800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='team0\x00', 0x10) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x4380) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:01:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000000)) 07:01:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x500}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 963.708159] IPVS: set_ctl: invalid protocol: 63 0.0.4.1:20002 07:01:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x40000000) recvfrom(r0, &(0x7f0000000000)=""/17, 0x11, 0x40000000, &(0x7f0000000100)=@ipx={0x4, 0x5, 0x3f, "170da3719edf", 0x80000001}, 0x80) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x4, 0x0, 0xb}}) 07:01:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xff000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:01:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x600}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 963.889714] IPVS: ftp: loaded support on port[0] = 21 07:01:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="fbf1acfc5fcbbf9ab628868a374473"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffeff, 0x800) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}], 0x2, 0x2, &(0x7f00000001c0)={0x40}, 0x8) clone(0x20210000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r2 = dup2(r0, r0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) 07:01:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xffffff85, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 964.483359] IPVS: set_ctl: invalid protocol: 63 0.0.4.1:20002 07:02:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x10}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x700}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xffffff9c, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xffffff9f, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x48}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 964.669325] IPVS: ftp: loaded support on port[0] = 21 07:02:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:02:00 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x20) ioctl$RTC_WIE_ON(r0, 0x700f) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, 'fd'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em0*:/!'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x77, 0x66, 0x76, 0x61, 0x38, 0x34, 0x30], 0x2d, [0x62, 0x32, 0x7f, 0x62], 0x2d, [0x61, 0x62, 0x39, 0x31], 0x2d, [0x35, 0x73, 0x39, 0x61], 0x2d, [0x7d, 0x3bdb68b28d5c1ebc, 0x63, 0x35, 0x64, 0x75, 0x62, 0x64]}}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x28) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000000c0)) 07:02:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x10000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1018}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x100000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x68}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0xfffffffffffffffe, 0x5, {0x7, 0x1c, 0x4, 0x148910, 0x214, 0x1, 0x9, 0x800}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x40501, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)={0xea, 0x29, 0x1, {0x7, [{{0x40, 0x2, 0x1}, 0x10001, 0x7f, 0x7, './file0'}, {{0x80, 0x2, 0x1}, 0x1, 0x101, 0x7, './file0'}, {{0x0, 0x2, 0x8}, 0xfffffffffffffffb, 0xb6, 0x7, './file0'}, {{0x91, 0x1}, 0xa0, 0x800, 0x7, './file0'}, {{0x1, 0x0, 0x2}, 0x10cf, 0x5, 0xd, './file0/file0'}, {{0x5, 0x4, 0x2}, 0x8e, 0x0, 0x7, './file0'}, {{0x8, 0x2, 0x6}, 0x9, 0x3f, 0x7, './file0'}]}}, 0xea) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x440001, 0x0) write$FUSE_STATFS(r2, &(0x7f0000000480)={0x60, 0x0, 0x5, {{0x7ff, 0x80000000, 0xfffffffffffffff8, 0x3, 0xb14, 0x2, 0x20, 0x101}}}, 0x60) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r2, &(0x7f0000001880)="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", &(0x7f0000000340)="fcd459d8893b76897f1792c99e83c3521ea81c93cbf6c2bc7e108b98788fde0acf56f9089d4d109ff71d05b2980b10d489b8d9721e18d1dc9da6bac5f1465a35b1bac1c3f80d75e992751b255f51a3fafef867f3bccb76cd67b40d4bc0ad8d7a6f79b33b2cdbadcbbdf89eb343ecb560b46e55b0c87d3ec2e4893d5f63c181538d8884fcceef7ee5bfcdf3610068b199d11c", 0x3}, 0x20) 07:02:00 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8001, 0x80402) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000002c0)={@empty, r1}, 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:02:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1810}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x200000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:00 executing program 5: r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x800) fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="e2e0e47528100000000000000004000000b58a0000"], 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000200)={0x1ff, 0x4}) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:00 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x2000000000000482) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc040564a, &(0x7f00000003c0)) 07:02:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1902}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x300000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x74}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x400400) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x1, 0xdb, 0x8, 0x1}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000100)=0x29, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x20, 0x4800) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:02:01 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x40) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x400000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x219}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000000)={0x7, "d63b8e30f58f9b73fb8d2c6a78e08cfe40ecf7b34240f0d1adfc129def8d8cd9", 0x1, 0x1}) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:02:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x500000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xa0, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x300}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x600000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8000, 0x40) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000100)={0x0, @sliced={0x584, [0x401, 0xf74, 0x5, 0xfff, 0x0, 0x2, 0x3, 0xff, 0x9, 0x8, 0x80, 0xaf, 0x6e3, 0x1, 0x9eea, 0x360c, 0x8000, 0x1, 0xfff, 0xfffffffffffffff9, 0x7, 0x20, 0x100000000, 0x3, 0x0, 0x61, 0x6, 0x6, 0x9, 0x57b4, 0xe91, 0x7, 0x8, 0x7ff, 0x9dca, 0x2, 0x20, 0x4, 0x1, 0x3, 0x9, 0x7fff, 0x8001, 0x4, 0x2, 0x0, 0x400, 0x5], 0x1}}) unshare(0x4000400) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000200)=""/55) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)={0x2, 0x6, [{0x0, 0x0, 0x5}, {0xe55, 0x0, 0xaaee}]}) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) r3 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000280)='self\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r3, r1, 0x0, 0x11, &(0x7f0000000240)='/dev/v4l-subdev#\x00', r4}, 0x30) 07:02:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080)=0x8000, 0x4) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x500}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x700000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:02:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x1000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x3ff}}, 0x1, 0x400}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0xc4}, &(0x7f00000001c0)=0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000480)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4a, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)='veth1\x00', 0xad, 0x7fff, 0x1ff}) ioctl$FICLONE(r1, 0x40049409, r0) 07:02:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x600}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xa00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x3) 07:02:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xf00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffd, 0x200000000002}, 0xffffffffffffff35) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) read$FUSE(r0, &(0x7f0000000880), 0x1000) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="10000000000000000400000000000000b8fb3264ddfce76460de51e2a6d88e1e03e79e8e47a64589282e073957c0678bc8ce21bcd28e51c6f5855a2d738e31995cb6a9d83b772c709fd0eef413f857b3fb7b7356959f76a30775545b5280046e34edc76438ce84c849500ad6f1b7a5d98bdbe44b9f193e03b58629f6efd04ceb24f351c7bc074ca88b3f67789e16afc9b4"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x700}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) 07:02:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7400}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1000000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x101000) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000340)={0x23, 0x3032344d, 0x7, 0x1, 0x2, @stepwise={{0x10, 0x8}, {0x100000000, 0x67ad}, {0x1, 0x1}}}) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x14c, r3, 0x424, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xa6b}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x22}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x81}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x20000080}, 0x81) 07:02:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1800000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f9b8a3a098cb696643030303030153030303030303034303030302c757365725f69653d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="5994632ad1abd168a3ed1e6e9d16532f453fab37ad756fd18635248f57e89010906b96a9527d6a0781ce401b370983634bc91058fc771c89408400d80d0c0efe1ec3d43d5e936ba2b32e2c6779161a792075319525e0cc1c031e1ebd1aa1943e73e501facc5974"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x80000001, 0x214200) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x80000, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x101, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000480)={0x0, 0xf88}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000600)={r7, 0x6, 0x5}, &(0x7f0000000640)=0x8) r8 = dup3(r0, r0, 0x80000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x0, 0x0) r11 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x10000, 0x600000) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04042dbd7000fddbdf25050000005400070008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="a55d5f02f99d724a9645b51f31a408000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r11], 0x68}}, 0x20040000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00-', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000040000,user_id=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c14"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1018}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1810000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0xffffffffffffff2c) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x8, 0x2}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:06 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x8000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r1, 0x94, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0x1, @mcast2, 0xffffffffffffffe1}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e24, 0x42e1c716, @loopback, 0x100000001}, @in6={0xa, 0x4e23, 0x3f, @ipv4={[], [], @broadcast}, 0xda0000000000}]}, &(0x7f0000000240)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) sched_yield() r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280)=0x800, 0x4) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:02:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x1902000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="7385743ba2fe25ee7aa33fc81162d37ea729c863463163929f0e56dfd66db4e37f1523ad379eed97bf065ea308008701ba158a8bf049e3dfe4263a18056de24f9311cfbb96b9e9c975f964fc995037aaa2040018d9f9bb04cf758c2513592532c334c0e16220"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="120000000000d6ab0400000000000000"], 0x10) 07:02:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1810}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0xffd3, 0x0, 0x2}, 0xffffffffffffff24) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070e6a33c22ae9c2e0aa00282e2e3d0ec049875c5c05b68e3896e9c5094828dd6f3bb3a8554d8580d5509ef8af6407498026c3fbc89") unshare(0x4000801) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 07:02:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x2000000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1902}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)=ANY=[]) setxattr$trusted_overlay_origin(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) read$FUSE(r0, &(0x7f0000002880), 0xeef) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1343) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1000000000045300000000010d000000"], 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8}) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x20012, r4, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x91, 0x80000000000000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000100)={0x6, @pix={0x100, 0x8, 0x7473776d, 0x8, 0x1, 0x36da, 0x0, 0x9, 0x1, 0x0, 0x2, 0x2}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101400, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x80) 07:02:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3c00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000540)=0xe1d, 0x4) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) ptrace$peek(0x1, r3, &(0x7f00000005c0)) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000340)=""/174, &(0x7f00000001c0)=""/102, &(0x7f0000000480)=""/137, 0x2}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)={0x10, 0x0, 0x4}, 0xffffffffffffff7a) 07:02:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd}}) 07:02:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x3f00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x5000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4000000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='B']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:07 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x91, 0x3) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f00000003c0)) ioctl$UI_DEV_DESTROY(r0, 0x5502) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x102, 0x3, 0xc000000000000, 0x46}, 0x6) 07:02:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4700000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="2285787a545aba99edb94e414bfe417ce0e2a82fcac7c2b3aed2546576d336d5e072560f5bee7e405354ea84d57e8f4dd2ea89891ce539a00ae15fca857541f2b1c5516a7ea718"]) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0xcb, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000400)="fd57b00ef4ed991911cfa8ad7edb3836c929ffdd073fde44c3206473570fcb35bec3f8deed11b0aaa651d2c4b18eb2d4840d27850d3751f636f8ccddd0f0c7baf899b52dcc84d3547d8407296a0a4789b5940abf2e89db103cfc4b1af8184d44b0be55c176ff2810d102de7f7ae0f05b5352c9d05568bdf84446972e69dc00353690ce0a7e17dbe9d1e74c614f49fd3b99539e518f3a2d53a8e48ec8729a84d6b025f69e26b1c7b30a461b74cda2f447cd628efb829411f33012ffee723c1adb96006c06728033e1fc451c8af7ec5118f3fe483ea77635ea338b2d25536841c9af8bef7258ecf90028bcbbb4d7ebdb777129") read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = open(&(0x7f0000000080)='./file0\x00', 0x101040, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x5, 0x8aae, 0x7ff, 0x7fffffff, 0x1000}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={r3, 0x8, 0x0, 0x1f, 0x2, 0x9}, &(0x7f0000000200)=0x14) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000140)) r3 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x3, 0x2) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f00000002c0)) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000005e0007031dfffd946fa2830020200a00ff0003660e1d85680c1ba3a2c40dff7e", 0x24}], 0x1}, 0x0) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc040564a, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000300)={'lapb0\x00', {0x2, 0x4e20, @broadcast}}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x3, 0xc00000000000000, 0x8, 0x100000001, 0x7, 0x2, 0x80000001, 0x8, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e22, 0x9, @loopback, 0x6}}, 0x0, 0xfff, 0x7, 0x2, 0x2}, 0x98) 07:02:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4800000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x4c00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f00000002c0), &(0x7f0000000340)=0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@subj_user={'subj_user', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r2}}, {@fowner_lt={'fowner<', r2}}, {@dont_measure='dont_measure'}, {@euid_eq={'euid', 0x3d, r1}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f00000000c0)={0x100000001, 0x7, 0x1, 0x7}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) write$P9_RRENAMEAT(r3, &(0x7f00000003c0)={0x7, 0x4b, 0x1}, 0x7) execve(&(0x7f0000000400)='./file1\x00', 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x200) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f00000001c0)="a6b5bfe7e4476456c7d2e0c0ec369f53c6eb800955a825614b5d1e8df978992d80a56648d919dd6b667df2c56f2b902c3c575e77dd6271b41497ce99cea7af6c950ecd52581d21a54c72181198d5826054f01b") 07:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x3c, 0x1, @in={0x2, 0x4e20, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) unshare(0x20000800) r3 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc040564a, &(0x7f00000003c0)) 07:02:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) prctl$PR_MCE_KILL_GET(0x22) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) prctl$PR_GET_FP_MODE(0x2e) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_NMI(r1, 0xae9a) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x10000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6100000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6800}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = semget$private(0x0, 0x0, 0x1) semctl$GETZCNT(r1, 0x0, 0xf, &(0x7f0000000440)=""/4096) unshare(0x4000400) r2 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc040564a, &(0x7f0000000000)={0x0, 0x0, {0x2000, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6300000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x18100000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x5) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6800000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x19020000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7400}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400002, 0x80) mmap$perf(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x3000000, 0xef230ef827d9e1dd, r1, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r0, &(0x7f0000000000), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x0, 0x3ff, 0x3ff, 0x1}, 0xc) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x402000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x220f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") unshare(0x4000400) r4 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x4000000000000091, 0x80) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc040564a, &(0x7f00000003c0)) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000240)={0x0, 0x0, {0x7a00a966, 0x5, 0x2, 0x1ff}}) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x6c00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7100000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) sendmmsg(r1, &(0x7f0000003800)=[{{&(0x7f0000000600)=@pppoe={0x18, 0x0, {0x4, @dev={[], 0x1d}, 'ipddp0\x00'}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000680)="d4d8f770a1c94377e84030ad6aa59676dd266c1f316094f3b676bcccb69a695e653d0d29b062360268d3654186981257394f1ca6d714fe44893b63f383a868679f6c63b022008b9bc2f555c8a73024b796f9c2641b4b8bff08fc0384559b3b0603bbceb98500e85d8d2b6653f1589e8d44a96192c7e00e7c", 0x78}], 0x1, &(0x7f0000001880)=[{0xd0, 0x0, 0x9, "fdd171cf60dd5934d8b4a628705a60b8c0ec8629871beb92ea0119b54ae93e3751c9386ac8c422e50fddafaa314f978d69642fbc95eddc7a0fa588933c0ef9240b295c50d7cbbd40927a18f31e5d791654894a9af2023c7bdbeeb3ec07e7076f547ca32d32381769c91777eaa8b3cba25e6de74baed807cbacc9450f12be3e33271230f75ad9248f2fd19d2d41daa64ec1024d99391b1ac56d5350d45bd8d5ab70a2614b240bb1b1b7eece314ae58888dcccf0f7f8f92e8475"}, {0x58, 0x101, 0x3, "8d3b1020bcc67270e8a519472683122a21b6c725b21cf106ca7f158d072e85090ed3b6ff7e95189a8f530313fa566cb9cb5dfc4d3b7f53ee4301596ac07a2f770991a609c8"}], 0x128}}, {{&(0x7f0000000740)=@generic={0x18, "04dc0fe1fd37d0854b9b89bbd284a89eb1a1ed44ebcbf51e19449ad8514c50d2e65ca4a450be772d8fba23020ec53d972b853c92f38996d1ec2eb7d635c2e6875c9d543be6531be4a2fb7ff0552423f364aa4b105cb16a72e0b170d8707da627bd012082365846ece5d584983e30d205b5ee8c6bc51eb833c6cec367101a"}, 0x80, &(0x7f0000002cc0)=[{&(0x7f00000007c0)="c1ddbf6b0b073261c73abdcb73be1c10ece27044ca96cfb23fbbac7a45221bc7", 0x20}, {&(0x7f00000019c0)="3827951d13f23cdf174924a36610e6f44c1bb0b4ea04468eb6fe30da2d5ae8bd7e10b7c74c56a20af7f8d31dc1877ca7a681ac388e1afdc54973cc352f81f8f591113dabb9a2bc3430618fc2", 0x4c}, {&(0x7f0000001a40)="7d507511978e2ebb93cc0afc4c76320a9293d5520474b5d2285d77c1ac0c3398943192e966e714bbda80ab22063d284aef86c3d89f458235df78b725d8b542319468d8bf56", 0x45}, {&(0x7f0000001ac0)="a31a9af73c3beb9fe3dcd38ae9ff28a6969f40bc3452fa6357ad7c9c62e70519dd400f864eac65c6a69aa9a9317aa8433941c90cccdfcf2c68a8de7a4e39b454d31eaf80c59414fe012db257d1f720b8e8e6b6bdf4d439b5fc1de5225cbbac622dc007ef9a0ac3d9e9574b3aea4b566deee592aeec333e61ddff03c9f48b", 0x7e}, {&(0x7f0000001b40)="b81f14d16dab20f8b28a4fd8c71afba168db8e60abcb872a97245f79c99aefdc2611bd4171125cd8807b2d1cdbf06622d0fb248323fdb243da1a991977aa9ab42d5ee604ce2377901f9eb0dedc1c6acbb489d16ebc5fd824d9b958652e966c9a4e1093b2b2d7b3ae2138c06f70f6e872daff403ba0cd7c4e03811a445811e0312cb43679c6f8438aff2852efcea4c325ace367c1df2e111186be47b4206690c78ea31ccb164f3133dcf817261eba89c27bf1b073929830bbc5b3ee4409ccf5940b2826b1702f8ea49538999d504779916b4934bc58889d95d31ae00fa82de29f6f42541130ba8cd0e1bf", 0xea}, {&(0x7f0000001c40)="11d1852024b23baa6775435c38fdaac3bcd31415a293cf6e6997a8cae4d84e8cc92b10f06e0ea13c32cad82c79591340d735f51eca35ae22898bf3369f56c1410457ba4fe42dcd2e5382a0a3", 0x4c}, {&(0x7f0000001cc0)="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", 0x1000}], 0x7, &(0x7f0000002d40)=[{0x48, 0x104, 0x1, "fc92f2427a3f98a1b6b3bae998f30dd47b986abc498a8cc411d4221630bfab013f03e2f53add11d02987ea567008bf13b752842427"}, {0x18, 0x11b, 0x7, "d4b566e9f9"}], 0x60}, 0x20}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000002dc0)="8f52887ea4cff2316c9fc49b337469ea4d5ebaff2a90cfbd78778802a401b1db90269eebf14e9be6f611c1e474bb8a0ca194648793520b9ded2164b136abab2ea782b5c3072a7dd2f5b58fc32d994c2f", 0x50}, {&(0x7f0000002e40)="a51b5f49431208efda6a376f2aced91848f8adcebf223398c4e434097fd999a5fa547d93d90ea6f32a3f5016fd2b5b6954911a92af36fb34a23485691519960544cc815745cba505ec61c268aceb98594c1f19afa41f63d8619184f317fec30b97723e622aa6c14c54e1fb5453", 0x6d}, {&(0x7f0000000800)="3a3c14e5cd33f19ae4066ca397ca5b06670a13ea", 0x14}, {&(0x7f0000002ec0)="4ed568b152e27dab5b8d0c692592b379828cb9f208698896e3f90f374da59a402decf6ed83c0c4c7a7ba37815957cde8dcdf5456abc9b506993afa65f57bd0a72ec31667e851b8f8f48d1d5ef5c4b924ebe99097f2519d8e904a4dd4bbb7ff37f2e4754b99f37016b31e5ce469d7c6fbeb9f9a3c20a17d8e350f94c3d03999a99b163f4e66c7c5a543088314ae7022ef290b4a68ca1e0c9d5bc85cd997c0ab9a04ba24c0e731e83f66df76c89596cb8430994285c75e0a8c042a4e7fcd46c8a84e98d4ea30d182f7ad4a87c0b7361e3d3aac08cd6e2f96fc13f59439b879f29000318a333185ceddf13f5333fe", 0xed}, {&(0x7f0000002fc0)="4aba7004d88d0e6875fd59ce649752d3fbec1fbec09b87c6e9f8d939e8f9f5a3e436c6efd32db66b4ad6ff4da97fe89097753da39314cabe45e69ba034ad5b07e0141a2cea15b20641e653d9370c12b780d0ec28d24433715024c6be77ca9de7d8ee6f18a7ec33ad32d29fee877daf0f94f3a8a44f45d5c2b66773615c21ff827b17d77b204e5a590f713eae58b9ab3d280fe1c98cb0f4060cd9de86f43cd95e44cf8aa838b32680a46d9952d126e7aaf2ce0dfc435b45aa894d16f8c08dd16c7f7975aecd89c54cc7f932816682b730356645eeb46ee1c0500c55", 0xdb}], 0x5, &(0x7f0000003140)=[{0x100, 0x104, 0xffffffffffffffff, "9cc8a9d004c93f0d18a5e378f83c09ae450ba262f9dbad8a55e56593b30b1f73d745bce70d0de171068a0b860103e878bd0718eb7e9b938675307189d4d9318c0ab57a307fb39ffa8f46f82e9cbfc60fb769efaff1c8e2c0f229fa30bb92d7d656b725fecbdb6fa85cc20f6f7ff812c6417dfb38a76bfead9c873c8fbf9ca039d95a37b0872eb7ecbc409fc1fa24978e3a3f3cc4803bf7319b4de5b00dd7dcb9bcc59fc006f7622c6e71045b3be415011347f2970526a1881c7c658d9241b68d41063fd302c5e407215b3672faf0ab1a0ec2cb8e178a4bd3948266ff4ee1ead5f5d721d1afbfc5c450f5c50fa23da079"}, {0x110, 0x117, 0x100000000, "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"}], 0x210}, 0x9}, {{&(0x7f0000003380)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'bridge_slave_0\x00'}}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003400)="f0ad6cc462df49b0", 0x8}, {&(0x7f0000003440)="044b0e60ed3b9273af7e28d1ab37265f5109dcb064b28d9aa6c7f410f52bba2873d78ae8117e86d075d43508c7785037c440c5cce1f9f8d7d8a82e9eb05f506b3443e5476da780617bfba6ab097f89110da468e101", 0x55}, {&(0x7f00000034c0)="9c83d56eaec957111036d5fd470fd190f83119babd436e52c8ebe4061f8fdc86cafb627fb42a0b441bd55cd46d40ace313d34a7761e31bb1cd32b6bf474b55e97ead2729bfb8a10aac0b9daeecd9c65631afdd0a5b0551f81de782b52cd5e39ec795a2c57aa9949864d472ff8c61e9b84de4558b68fd95526d02f6bcd91d2872318f03f9352daced348d21dd6066dd293f7556dbb0b2e084adca73feaaf8dd41d85df78d8624183e2b71cc12790f", 0xae}, {&(0x7f0000003580)="8a46e76b0b9e6c4ff5f6296eaf06208a3acafb652e9e26ad32f3b2a53cd45f49658db861ebf0c9cbb1770353365c2329a253d8d8981bb6c8f63ddc9cc6c91eddc314c60c5d2ae854148bb2408e84d8a2a1b40fc46c8c38a8127ecd57a2cbe0d141f987b3276fa5d6ac815a51951e", 0x6e}, {&(0x7f0000003600)="c32bc506534137d57bd1a92b15c2b8113f449dfe45ac9f72a63babffb6dd4bb1c5241efaf7820f00ed90c393effd1162060b1b3c16cdc0367a66c395c4ea8f7a67976d28cc38f5ac490a79c721436ec1d39c5f36f091c3ab37fc3240f60963cab6f2aeeb2d08421e91d82113a90db79a5b92a00f1e25b20c23437eb8ccb198a275991d3a50cff49bb6cbe7111907e5f03b19e68fc95010f224d3c481d5e6200d3702ddfc7e7ccb7c93d4161c5f5a2c52d4a9c2a156536bd1d793f00e755252f8a8cd948a5dd527c84828eefd0892792f", 0xd0}, {&(0x7f00000050c0)="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", 0x1000}, {&(0x7f0000003700)="43041b906950c1807e9ec740b065aef76b0fb81b5ee45fbcb49885294d6ecd15c0ca6f4183f54c91fa95040bc3a3637b900a27a62f0478232d3ee3a28dc77854fb62c0e50f88b1f8bca69a3f35ce614ab80603d64ce9f29824333621e5777c1a84b5bee8a7", 0x65}], 0x7}, 0x2}], 0x4, 0x800) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x3, 0x0, [], [{0x1ff, 0xf36, 0x5, 0x6, 0x1f, 0x3}, {0xffff, 0x4, 0x0, 0x9, 0x4, 0x19}], [[], [], []]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f00000000c0)={0x6, 0x100000000}) clone(0x41820000, &(0x7f00000002c0)="ebbedc5fd30ded89a1513a241f9cde045477c48447d3927f041f38f27b6a1d8ebb41639189944981dcebc0cb581e38e5d3eba9f08af4f8f1126e3b49375a4d83c5a3552332bec6d4413550030299cb10d9e0bb1d0a458860123a3b4c27fe3794b9930b4138eb686d78c8970096829d5e19eee949b2ac61296235c4c5aed95c353eeae7798054637337d504621aaa81c059d8a9a11fb43645c905ce5751608456c232d995c0e9ab3de5fbae3f517100b731543bf5ea3733c7ec804b7bb21b8ec1f5905b1e338573fff368fd1f276e793ccc9781627eec3f3db2a7b91f6207212a2c63bc", &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000003c0)="5ef60e6b21eec248b7f782919445f318fd103f87b233ca759ebf0f19fffcea63cb2616189db028822a74747069923c7764b28e36703a94f752982782da094991a715f13ad1fbe5fe7e1795b55a59e9b13fd4300663868814e60922") read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) socketpair(0x3, 0x80e, 0x3f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000003900)=ANY=[@ANYBLOB="dc22faf15ba5c1d286c8ef81ca9072fb7df2edd8d54834d5c5e5ff7ed2dcb3e59395cd61cba2d8576d581aef1c6ac6911a8cbd228524f34c40341f6c8367e82b2a841fc097425485142da4bad49b5e3fa7a5995ceef1b47fef6287322ceb1ee318888428926b5f1906e7b68ea859fb63ce0389c19cf1e974a791437fde7caebf8c8a8161c77eeaa16a4f2e36cc79f11d50d7408127c40224ca959ff648e1cefc25f209c6f8cecf6bed3470816b08604570801773e6c5cfacc3f4dc7f99", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r3], 0x1) 07:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") unshare(0x4000400) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x91, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc040564a, &(0x7f00000003c0)) 07:02:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7300000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff00}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7400000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 973.243166] IPVS: ftp: loaded support on port[0] = 21 [ 973.438750] IPVS: ftp: loaded support on port[0] = 21 07:02:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000001880)="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", 0x1000, 0xfffffffffffffffe) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)=0x0) getgroups(0x2, &(0x7f00000002c0)=[0x0, 0xee01]) keyctl$chown(0x4, r1, r2, r3) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x40000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x7a00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="730d5309c0c9996df2c71f3b0898b9f0112f8ba4edf74ce6a2baa0c3cf8c83de932d83b3d4b474e8de5b0676d4fa42df823e4b45249f70d28e33d8710cc3885b5c501a5b6ec26fe5d51c965ce00bf27519e0774fead6637f0a1485b58c08117b4ef35329c130e6de25186388ea98c78df53f96850e40ceaa38d8fc5e0fffa45ed841559818c35d8dd944ac34229ca6efa118ad1af84581073c0a7cdd527e138650ca144bf97887015c0570c13e0c91020a3ae97030013a1b13caf3720486abab07ee070000000000000025c001dbfd60b6d8c8b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x48000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x8000000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 0: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x7, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000000c0)=0x3) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000200)={0xfffffffffffffff8}) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 973.998858] encrypted_key: master key parameter 'CÞrý=oK/MQ«9äR' is invalid 07:02:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0xfffffffffffffd8d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x85ffffff00000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x68000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r1, &(0x7f00000000c0)={0x18, 0x0, 0x8, {0x10000}}, 0x18) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xc0, r3, 0x326, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x20}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x63}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x18}}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xcb}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x1}, 0x40) 07:02:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x9cffffff00000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x5000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x74000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x9fffffff00000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xff00000000000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x6}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0xe0, 0x0, 0x4}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x600) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x9, 0x2) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 07:02:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="b026c2c5836577a2d74c73"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) fchdir(r0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000480)=""/219) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c4fb808d8536703f7e492d843374d0ccb120db804bdc8c4d325adec9802de6de0b0dca7e686d087e0b64c9c7da05bbdaa7969f9911a2edea5a4d61a8c2cbcb027f724af9cfdc03ba0"], 0x10) 07:02:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0xffffffff00000000, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x85ffffff}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) 07:02:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x10000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xffffff85}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x10800) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)={0x0, 0xe3, "cb1799ac51f69885e36e9ae4d34eda547f9bbba7dcf1f77eab031b9fafe231da504e40863384f9c197ccaea49b8c178afc82e76d144aba88566040a9297cbae599a05911c6d2750bb62ef1f8d5c10b49dfaa324f671b89b63233750dc9d1c1ec953914604b25e44cffa0b877204f2148b86afb1f52d16dbc84187ed086237191787de5e755e0f311591d67314ea71b2d88253e67e7f3c0714021242f30780d92da043c9051c29986a2bdb03e0f4be1734db9f9f93ecf10b19a1ca9a6664b7971ec8d96081da22358be49d12a9dbe0c53bdfe3f64b97803ff30ece206169a1a67e62541"}, &(0x7f00000000c0)=0xeb) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x12, 0x400, 0xe4, 0x40}, {0x9, 0x6, 0x80000001, 0x3}, {0x1, 0x2, 0x100, 0x1}, {0x4, 0xfffffffffffffff9, 0x9, 0x3ff}]}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x4, 0x8000}, 0x8) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x18100000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x1000200, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'veth1_to_hsr\x00', {0x2, 0x4e23, @multicast2}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) write$FUSE_LK(r0, &(0x7f0000000140)={0x28, 0xfffffffffffffffe, 0x4, {{0x6547, 0x6, 0x3, r2}}}, 0x28) 07:02:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:02:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000002, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x100000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x19020000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000400000001000000"], 0x10) 07:02:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) 07:02:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x200000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='&d=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000340)=0x847) read$FUSE(r0, &(0x7f0000000880), 0x1000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400, 0x0) write$UHID_INPUT2(r2, &(0x7f00000001c0)={0xc, 0x63, "38648c0fd561cb9aca0b905bc6e8b9d4aa37ef9d05aafee1d6a710c01de42b8f4ad31b34e9b246066872e865821ec430d5e0a9c0d3744be46859cee8a8a7a3a1bde33e31bb2fbdd2658870bbd34ad4df4f045c291f96b5038832e7e5babaa7bf26394a"}, 0x69) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x28002, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f00000000c0)='fuse\x00', 0x5) 07:02:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000003, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x300000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = dup(r0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f00000000c0)=0x5b) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0xffffffffffffffff, 0x2}, 0xad075a53) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r1, 0x0, 0x2, &(0x7f0000000140)='fd', 0xffffffffffffffff}, 0x30) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000200)=r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="100000000000000004000000001b91d8"], 0x10) 07:02:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) 07:02:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/mcfilter6\x00') ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xc) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xc000, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000004, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000005, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:02:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x500000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x40000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000006, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x48000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x600000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000007, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303000100000000000003030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x700000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) arch_prctl$ARCH_GET_CPUID(0x1011) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300000a, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x68000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) fgetxattr(r0, &(0x7f0000000140)=@known='system.advise\x00', &(0x7f00000001c0)=""/83, 0x53) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000340)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xffffffffffffffb3) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0xc94) 07:02:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300000f, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 07:02:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000010, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x74000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1810000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1902000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000018, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYRESOCT=r0]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x85ffffff}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000200)={r2, 0x2}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000340)=0x800000000000bb62) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000e00425af2e00000000"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300003c, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x20000, 0x3) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xffffff85}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c40599ac9d93b7c22876b32e44e5dfd9df648a32707deead83834cc24f6cea19975b8eed32db0881e1b76a7ed261902a5aa0a8b13a9897808a423a3a65ef63a6a97f42030484e61074719ff7d50a1a9e78409648c5eed0db12155bed97944ef3c66ed2a0ddfb6c65c5e34d852acdd93d93ac7c41a7b44b369de14d433dc3195af33939a45814dc91ffb2d31c2e286fd733ee99aa6b2ec40edf96c7ff58ac91294a783c8"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000047, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000048, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300004c, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x100000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYRES32=r0]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xfffffebc, 0x0, 0x4}, 0xff57) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000061, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x200000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000063, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x300000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000068, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x112, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000000c0)={r2}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)={r3}) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300006c, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x6, 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001880), 0x7a8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000071, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x500000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:20 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000073, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f0000000740)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x40, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000840)=0x6, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002a00)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x28, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4000000000}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x8001) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000700)='/proc/capi/capi20ncci\x00', 0x80, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) fstat(r0, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000800)='fuse\x00', 0x10000, &(0x7f0000002900)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'fuse\x00'}}]}}) r6 = getpgrp(0xffffffffffffffff) process_vm_writev(r6, &(0x7f00000001c0)=[{&(0x7f0000000500)=""/212, 0xd4}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000340)=""/181, 0xb5}], 0x5, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/12, 0xc}], 0x1, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getsockopt$IPT_SO_GET_INFO(r7, 0x0, 0x40, &(0x7f0000000400)={'filter\x00'}, &(0x7f00000006c0)=0x54) 07:02:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x600000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000074, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='(\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x700000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000000409000080000000"], 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300007a, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x4) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xa00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000219, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="73c539c5e94c4f7a55dc6ec1f45b39441fe95b9fd852e6357716ea6d41761cbb4275afe85087ba69c59914146e432e361c04f87565d54fabd1a6e1ce8e7a0f26a966115929a131e4be5e948c82d722b6a08d1818bbbf917abf3ac6b1e10b169dd9f461444ef2"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) sysfs$1(0x1, &(0x7f0000000080)='em0.\x00') read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000300, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x22900, 0x0) 07:02:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000500)="37878c5a8e2804fa6121c2cf73920c04b92b3be394fc48ddd7500e2fd4c2f0e5e20542a3abb07e3ccf4dc1aeed831d3f1d9a2c257616dfbbe5e7a2847d9f2a6b668939d06d667bf49666c9e4025d7ebd3d0a6507b54d3910c9b7dc8a72804b589c1123d79e145ef64087c70c8b4ff89390fdbf33e94cd4dae31183fe5c6ebf41ede9ff1955b0fabbf7f0e7d881335c474fed37e518446e576605988a1b03080a9f11b59f77dad80fb7fe5ffbdd16feea450ee9b4b10c090869adea0677532e410ac0fce62b602242b5ccff73c98d", &(0x7f00000000c0)}, 0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x110) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000002c0)={0x493, 0x2}) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x10, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000500, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x219, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1810000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xc0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000480)=""/207) 07:02:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x923, 0x10400) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000480)={0x4000000000000018, 0x3f}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3ffd}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, '+--!{'}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="ab0e6b301c87621db796ad780b4a897f510f9d890e86893aadfcadf919f1c688b80eea1003b788f72e79f297ef88a5776fccce7ba734451883081e137b774e8c409eb81b4e9a6bec204f13aec1b95badc0d3412925c70966331388a1d6d9c7018268ab1bb06cb7bca5a215b39f815a76c588b0dc1a99"]) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000780)={@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xff, 0x1, 0x4, 0x3}}, {&(0x7f00000006c0)=""/167, 0xa7}, &(0x7f00000004c0), 0x4}, 0xa0) bind$tipc(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="5527be8252645d1268e8202623ac2ba3", 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000340)={0x7, 0x7b, 0x1}, 0x7) syz_open_dev$vbi(&(0x7f0000001880)='/dev/vbi#\x00', 0x3, 0x2) link(&(0x7f0000000280)='./file1\x00', &(0x7f0000000380)='./file0\x00') ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000180)=[0x0, 0x1], 0x2) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x1902000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x1018, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000600, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x140000000000000, 0x4000) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000003c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)={0x48, r1, 0x104, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x1d}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4040) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="ac05000000000000003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="28e9618afc"]) read$FUSE(r3, &(0x7f00000040c0), 0x465) write$FUSE_INTERRUPT(r3, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r4 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x4d213ce7ea657d10) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000200)={r5, &(0x7f00000001c0)=""/27}) read$FUSE(r3, &(0x7f0000001880), 0x1000) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x200000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4c8b"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x14000) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000001c0)={0x7b, 0x0, [0x7dbc, 0x8, 0x0, 0x9]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000080)={0x2, "dd5bc1c417de03d73b3c1416cf1b7c67b3e2f82e7a6ffdb66c4d4f91ed09ad37", 0x1, 0x1}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000700, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x300000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x3f00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) flistxattr(r0, &(0x7f0000000080)=""/82, 0x52) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="738fbd7db55f754eeceb38825a9a5fe947330196f06423b035801fc91f2ba7de0e6dcbe0bf895bca72ee3c027836b762b77883eb989b16f5688daa4f1c56dbc46d35a46f4a7847bdcbbee8b088b0e190e3eef2761061b66a92ce6ee3e5a0f1d840f130ebf850a7e5e2ef5deb7e2caf7fd0eab4f3ae3c0c09bb8bc022ff21c41c17eebf2c4cc8ad9e08794cf68b167b93a5c1e836b9945a6b6240b8cdc7d5b04baa7435285d74abd1972e68dba942dd0b4969d52fdb9405da6bd248112e4fe32c718b682645d477c85b21fa802cc5a2677c4f"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) munlockall() write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x700000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000a00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000002}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r1]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x3, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r2}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r5 = syz_open_procfs(r3, &(0x7f0000000100)='limits\x00') r6 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x101, 0x440) renameat(r5, &(0x7f0000000200)='./file0\x00', r6, &(0x7f0000000340)='./file0\x00') write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000f00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000003}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x4c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:22 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000004}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3001018, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40001, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000500)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x800000, &(0x7f0000000680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsmagic={'fsmagic'}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000001c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) 07:02:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6800000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3001800, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000001d000004000000000000000898f61a2525a56013be8601a6e255d9155d7be79e1dd561685f533007cd1911baf42c3d89cd6d0b1301e5f21e7ac95ec77cfda0d174ab6dc3d9ff2bf5667b02b40ba0b7081ee45adfede23d9c2987355ebb1229edade4884e77411c468a958689b7acd0ffac8570822df30ba0d930b697c1b8cc6f2ebdf3f77a3d925aed868ddfd40916b3376b3c2deaddb50aac0f39d98bb3996a0f5c380feff0e723c236a349c2c4f33e671c79d5c471d3ce78a60b8552a633b2c8bcd3f0cbf667201f9c0333d2fa26c66a6837618f689c615a339521879e22a4134af9ea1db179af91f8b67c29c3dee2db2890b924a8967d1698d5b10e812b0fb6bffba4891dbd"], 0x10) 07:02:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000005}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x6c00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3001810, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7400000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000006}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3001902, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x7a00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3002000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000007}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x0, 0xb}}, 0x20) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = getpgid(0x0) get_robust_list(r0, &(0x7f00000002c0)=&(0x7f0000000140)={&(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000340)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000000a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, 0x0, 0x0, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x8000000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000010}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3003c00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, '\x87p('}}]}}) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)="fb5cf55beed01a9d26dd98f652ae32b22080c6d02d", 0x15, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="f1ade78ae2ebda903b17c86719bc9abbababa22e97d41d86a47f0a2e015b0aa458cab5b8d4758ea67a995851", 0x2c, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r2, r3}, &(0x7f0000000480)=""/72, 0x48, &(0x7f0000000600)={&(0x7f0000000500)={'cmac-aes-ce\x00'}, &(0x7f0000000540)="5e61ab94369b54e3f7878f1531c7b3e426725f19a80f8799a795c230a7bb2dacc79a56e0b4844f1427383bc01d4d9efaf021b83ee8d04b64f9fd74f149fe52a83e057125e322a93d1f4f4a4f200a1213472c48eb1b135cfe1caec0ee79326fcbd24584e8e8342ab9740eab6d1e2c578f151dfc1ee2698181a9f2a6f85aaa9f8a47248d78e5778aa9ea1a5deed4e976f2473295578c72b459f873c85e99e5d4012f21829abb018ea09eccbfeecf670bad9a", 0xb1}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:26 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000048}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0x85ffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3003f00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xff00000000000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0xd2, 0x34325258, 0x1, @stepwise={0x81, 0x80000000, 0xd14, 0x5, 0x6, 0xff}}) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000004c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3004000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000140)) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x106a) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x5) 07:02:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000068}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff00000000}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3004700, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000340)=""/171, &(0x7f00000000c0)=0xab) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:27 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{0x0, 0x0, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000006c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x10, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3004800, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{0x0, 0x0, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x200) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000340)=""/160) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000074}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x20040, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000001c0)={0xffffffffffffffff, 0x8, 0xffffffff, 0x7f, 0x7fff, 0x3}) write$cgroup_int(r1, &(0x7f0000000200)=0x5, 0x12) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="7357b1942de3b3dfd45d5ebaa14de384b908ff9a8c11077fc3ef866409256ce5173bd66d4933fb464b406716cd9af8a49839c42c75cd3117ce6b8235aacd3b2f63376fc709c079a153e33f124db18be2f32ffc1cc2513149fefd74e772180efadd7c426c389579dbfd1b583d4fa6de2865241402c0d926e2402b8f96448500819c93e5865f580e00510e488db457718f28f9f3976ec85d"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xd136ba9369340344, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x10}) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3004c00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x219, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{0x0, 0x0, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000007a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3006100, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x1018, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, 0x0, 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x14}) 07:02:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="d4"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000140)=0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000340)={0xb0, 0x0, 0x4, [{{0x5, 0x0, 0x9, 0xffffffffffffff01, 0x6, 0x10000, {0x4, 0x401, 0x7fff, 0x3ff, 0x401, 0x4e, 0x9, 0x8bf, 0x5, 0xd3, 0x1000, r2, r3, 0xe15a, 0x496}}, {0x0, 0x100000000, 0x3, 0x6, 'em0'}}]}, 0x79) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3006300, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, 0x0, 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x200000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, 0x0, 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000500)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3006800, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x300000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[], [{@fsmagic={'fsmagic'}}, {@euid_eq={'euid', 0x3d, r1}}, {@obj_user={'obj_user', 0x3d, '}\':^'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_role={'obj_role'}}, {@audit='audit'}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0xb}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f646507000000000000003030303030300bf241d0071286e730302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0x700000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3006c00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x101000, 0x0) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x88000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0)=0x40, 0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007100, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000002}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @local}, &(0x7f00000000c0)=0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007300, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000003}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xff, 0x80040) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000004}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007400, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000, 0x418080) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000480)="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", 0xfa) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\b']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0xfffffffffffffe03, 0x0, 0x6}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) prctl$PR_SET_ENDIAN(0x14, 0x2) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x101000, 0x0) write$ppp(r2, &(0x7f00000001c0)="8816de20a7317188a4799e6dd56af4463e5f5dc7604af6535c9e1d2fc73c0236bdf5fdefc9146ffb1997115c497ff77ea5df27461226515234b9b006401b4a3199cca53f28a690c54dff79439e9465da515bce7826d70a0b7bf4d62c03c3d7fbda9755ecb6c12fd13427776f576140cd848e61a921834d001a3a20fddd1667f21db9f03653f73fb8df92b79cdac3cc206fad1dd96b51fce6b77452da28a670615674", 0xa2) 07:02:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000005}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:29 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x1, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3007a00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="16a8aab3d420d4230a93e84fc958e967729cfd66542cb9dd3befa07a242fc9be91d49d0c6256d0e5b52d73919f2fe41692a9bd3ca9b1ae1bca", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000006}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x300ff00, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00002000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="737eb0670810edcc31162c383d1cba27f3a9389ceac1c3a755decf897d6ea823cdaa0022d8a3d7bfdf9ba34e5c5471ed19b0d18080f08a779b9809bf94d0d7159ce469f09678ca2aa1ca1f82daa977401158b3758e5dfb6b86ef2a2953e919117bf9415b4f52c6ebf3e4642d072e0a0a0d45a8bbef99a784242d7d3ba4eef9170068b6106611a90a41d498dce13837559b7e3cb22dea1632345468b3392e54ec182fb6f75d6a20a37d5751670f900f1905464b74d1c1664015f358d30ae2b11e80901ecaa49c7025e2cc95cffea410173e688efdfd0dc54d3168028f6149b181a582164acdbb9a5b37ea956be3e5c1c937d3bb8ec9c5eaffaeac5624e8291682e926df4e6be4ca281c6433a5a2ff65b0e3240fec12686c0bfb45f8c2bd1a716e7240a23f18de8a05e629dc5df4"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="738fbd7db55f754eeceb38825a9a5fe947330196f06423b035801fc91f2ba7de0e6dcbe0bf895bca72ee3c027836b762b77883eb989b16f5688daa4f1c56dbc46d35a46f4a7847bdcbbee8b088b0e190e3eef2761061b66a92ce6ee3e5a0f1d840f130ebf850a7e5e2ef5deb7e2caf7fd0eab4f3ae3c0c09bb8bc022ff21c41c17eebf2c4cc8ad9e08794cf68b167b93a5c1e836b9945a6b6240b8cdc7d5b04baa7435285d74abd1972e68dba942dd0b4969d52fdb9405da6bd248112e4fe32c718b682645d477c85b21fa802cc5a2677c4f"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) munlockall() write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00003f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000007}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000000a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000010}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, 0x0, 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000048}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001880), 0xfffffffffffffe68) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0xfffffffffffffffe, 0x6}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0xe0, 0x0, 0x4}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x600) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x9, 0x2) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 07:02:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000004c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00006800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, 0x0, 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00006c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000068}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xa010020, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)={0x150, 0x2b, 0x300, 0x70bd27, 0x25dfdbfe, {0x13}, [@nested={0xc4, 0x3, [@generic="fdaad3c0b8c62e932b2df2114c56ad86fc9a7efa072ffa1722b257215eddd343d3595abf7311b3a7f32061adf7000dfd655d9ee557ea870d89eed9adb096904df342184d320eee97ef02ec4630af579683d547369368a2d9f2694b42a89eb3e1c6d200abcc793306a19c709cad6997fcbf140850271ff31c074c2d49f59e366c871aaf622047132147aaac574786be76beb3abe6f6d24a0faf5addd08abea2a86511ae0d98ec509a00bcc9b6b8859022a81f88be85ad2594261e93ca62c7b0"]}, @generic="01c384e79fcef689bb988b04be696c4efa696a7419f7a450fe5467af578d217910f0a46919f9defde222bf19a1a9d0f466bc2cebf3ff8e00455f6a8d962edb6215f7dc70679735d7dd2ecb48cfdd45edd4fd13a2e03f0e246f4d619e1c997ae0ffac01363a0524685a13403f88c2", @typed={0x8, 0x5b, @u32=0xff}]}, 0x150}, 0x1, 0x0, 0x0, 0x8000}, 0x40) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:31 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, 0x0, 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00007400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000006c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00007a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000074}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000007a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000ff00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x51010020, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff01000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 07:02:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xcd000020, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="daee03ddd6eef4b2d435b3ec1c739492100e66a8e0dc8373461a307820298d5f3f0826dada6ee878863e41b37acd1c2815550dfc8717c6a7832a7273e320da13f89bd7e3683305c14c2d19e7a86984102ecf0f134592fefe2f499dad46670bcb2d14d02eec56b7563b5b236ea44f809f81f588fbf264c123e12e5c37e6defced852752cd405e4affb2f13aca9999371490d5a4ca79e19ac4130242d08f76939a9aefbab9c677573f5c0131f555615a45bda5726530964000000000"]) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xff, 0x40202) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000001c0)={0x9}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xfe24) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000480)={0x5, &(0x7f0000000200)=""/62, &(0x7f0000000700)=[{0x2, 0xc7, 0x6, &(0x7f0000000500)=""/199}, {0x614a92a2, 0x68, 0xffffffffffffff01, &(0x7f0000000340)=""/104}, {0x80000000, 0xd1, 0x8, &(0x7f0000000600)=""/209}, {0x9, 0x3d, 0x1000, &(0x7f00000002c0)=""/61}, {0x3, 0x0, 0x8c41, &(0x7f00000003c0)}]}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$P9_RRENAMEAT(r2, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x9) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:33 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff02000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff03000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff04000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:02:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x4, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000480)={{0x0, @multicast1, 0x4e22, 0x2, 'sh\x00', 0x21, 0x9, 0x75}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x1, 0x80, 0x6, 0xf8}}, 0x44) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000001c0)={0x8}, 0x4) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000340)={0x49, ""/73}) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) set_mempolicy(0x0, &(0x7f00000003c0)=0x8596, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) socket$key(0xf, 0x3, 0x2) sendto(r3, &(0x7f0000000080)="08ae8d74232cd8ae0bff2c15611d746246361cb175bcbcc4d1fb585d04292cc87c5169cfd5c90325e8", 0x29, 0x20000000, 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f0000000200)) 07:02:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xfd030000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff05000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff06000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0xfe030000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff07000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x2, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 998.951542] protocol 88fb is buggy, dev hsr_slave_0 [ 998.956670] protocol 88fb is buggy, dev hsr_slave_1 07:02:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) 07:02:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='Y']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) clone(0x9ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x80f, 0x2) 07:02:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:34 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x0, 0x0, 0xfffffe01) 07:02:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff10000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00001902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff18100000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x5, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 07:02:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='X']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc6000, 0x4) readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=""/169, 0xa9) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1000001dbd010000000ed000c7480000"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00002000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff19020000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x0, 0x0, 0xfffffe01) 07:02:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 07:02:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00003f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff20000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff3f000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xa, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff40000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xf, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x0, 0x0, 0xfffffe01) 07:02:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0xffffffffffffffda, 0x1, {0xbb, 0x0, 0x0, {0x4, 0x9, 0x4, 0x400, 0xffffffffffff0001, 0x7, 0x2, 0x2, 0x200, 0x6, 0xfffffffffffffffd, r1, r2, 0x1ff, 0x401}}}, 0x78) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff48000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00004c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x10, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00006800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff4c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x18, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3c, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00006c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff68000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x47, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66e696", @ANYRESHEX=r0, @ANYBLOB=',de=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) clock_nanosleep(0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000340)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000600040000946bd2cd0077ed16a7589ff37d04141815"], 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x202880, 0x0) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000001c0)="b9090800000f32c422fd20b5038affb8b9800000c00f3235000800000f30b9800000c00f3235010000000f30470f01df66baf80cb8ee45df81ef66bafc0cb000eef40f00944a5185d62d2e467cfac744240000000000c744240200200000c7442406000000000f011424", 0x6a}], 0x1, 0x40, &(0x7f00000002c0), 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00007400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff6c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) 07:02:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x48, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x7}, 0x97) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff74000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00007a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4c, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff7a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x61, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0000ff00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x63, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff85ffffff}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) read$FUSE(r0, &(0x7f0000000880), 0x1000) 07:02:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff01000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffffff000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x68, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff02000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f59746d6f64653d3030303030303030303030303030303030123430303030c3397365005f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="10000000000000001000000000000000"], 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000140)=0x40) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000001c0)={0x5c9, "540ce3a0541acaaeb1eb8551e75086889aaffb4d1499e4ca1fff8e67c86dcede", 0x4, 0x14c2, 0x40400, 0x84, 0x1, 0x4, 0x6, 0x7e}) fdatasync(r1) 07:02:45 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff03000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x109000, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000140)=0x14) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000000880), 0x1000) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x7, 0x4) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 07:02:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffffffffff85}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6c, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff04000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x71, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000880), 0x1000) acct(&(0x7f0000000080)='./file0\x00') clone(0xa0000, &(0x7f0000000500)="a5f0fb4e5e93197ca742e8b17aa49df53a1bdd9fd574386e3facaeb83ae7f85208307f31d9929530ffa626a798ee4e04f1688f60520226596a632e701d991b9bb9645d5fe25a96d5d0ff90cadf1c511c9f8b4ac108f405d0c028973fcbb28c175f8fbcb8c35da9a8e68cb19c5e5e94a2f251613b3b75a33fb16c9a704c8a05ab04815e1189471e06d85ae7dc9a2e58d3a748b11666282292b495b6fa3655a905a5f08a2eb7f9cf15a155372d74306d2d7f8983c1853ac7fb406f43c96d9bc048bef37a7991f3478007cc4d4352a12f", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000600)="4e84bda98e1993ee6a698ea54b24b26ca5accd8a6e727a170062d2523620d1a47fd8770846d94c364f1188011f37c1c1135197475cfa135a07dcae6599c5cab719bfa760329e2f576e59782fa5c5f23bd1ff8a84b34a0169d41d020dc381d2d66f9d65ebbc5498cd76d2479231233ff16e96fea5ba02e4c5292325ccc61c9f12e18b8af6b5204fa57f09c290762d094b2356f790dcedbc24e9880c5a8fd83f801c94e462b8e7cc00f8e54ce8193d4095973ddef74c950cee8a1738b7978ad246620fcfb9b5d3a8fc767ff877d336b07a833407a929e5") write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000700)={0x90, 0x0, 0x5, {0x1, 0x0, 0x7, 0xd8e3, 0x3, 0x5, {0x0, 0x2, 0x8, 0x2, 0x6, 0x401, 0x7fff, 0x2, 0x1, 0x1, 0x400, r1, r2, 0x1, 0x8}}}, 0x90) 07:02:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x3d, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = openat$hwrng(0xffffffffffffff9c, 0xfffffffffffffffe, 0x10000, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) sched_setattr(r3, &(0x7f0000001340)={0x30, 0x2, 0x0, 0x6, 0x0, 0x6, 0x16, 0x3ff}, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/162, &(0x7f0000000100)=0xa2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x166, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./control\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f00007a7000)='./control\x00', 0xa4000960) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400) rename(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='./file0/file0\x00') socket$inet6_udplite(0xa, 0x2, 0x88) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = semget(0x2, 0x0, 0x10) r7 = msgget(0x2, 0x0) msgctl$MSG_INFO(r7, 0xc, &(0x7f00000013c0)=""/179) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000001200)={{0x80000001, r5}, 0x0, 0xfffffffffffffffe}) r8 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff3000/0x3000)=nil) shmctl$SHM_LOCK(r8, 0xb) r9 = shmget$private(0x0, 0xb000, 0x300, &(0x7f0000ff5000/0xb000)=nil) shmctl$IPC_STAT(r9, 0x2, &(0x7f0000000200)=""/4096) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000058, 0x10102, &(0x7f0000001540)={r1}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000280)={0x7, {{0xa, 0x4e20, 0x3, @mcast2}}}, 0x88) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000001380)=ANY=[@ANYBLOB="0800000044c300001a00010200000000000000fa01ebcbb821f2cc080046456ce3e517db2e96c83cbe660200b301838729b1cf2fb5bd1443d1b028c6478000"], 0x1}}, 0x0) 07:02:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff05000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x73, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0x7ffffffff000, 0x44045, 0x0, 0xfffffe01) 07:02:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x74, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff06000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x5}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7a, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff07000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000040)={0x3d, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) r2 = openat$hwrng(0xffffffffffffff9c, 0xfffffffffffffffe, 0x10000, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) sched_setattr(r3, &(0x7f0000001340)={0x30, 0x2, 0x0, 0x6, 0x0, 0x6, 0x16, 0x3ff}, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/162, &(0x7f0000000100)=0xa2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x166, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./control\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f00007a7000)='./control\x00', 0xa4000960) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400) rename(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='./file0/file0\x00') socket$inet6_udplite(0xa, 0x2, 0x88) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = semget(0x2, 0x0, 0x10) r7 = msgget(0x2, 0x0) msgctl$MSG_INFO(r7, 0xc, &(0x7f00000013c0)=""/179) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000001200)={{0x80000001, r5}, 0x0, 0xfffffffffffffffe}) r8 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ff3000/0x3000)=nil) shmctl$SHM_LOCK(r8, 0xb) r9 = shmget$private(0x0, 0xb000, 0x300, &(0x7f0000ff5000/0xb000)=nil) shmctl$IPC_STAT(r9, 0x2, &(0x7f0000000200)=""/4096) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x7) recvmmsg(r0, &(0x7f0000001cc0), 0x400000000000058, 0x10102, &(0x7f0000001540)={r1}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000280)={0x7, {{0xa, 0x4e20, 0x3, @mcast2}}}, 0x88) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000001380)=ANY=[@ANYBLOB="0800000044c300001a00010200000000000000fa01ebcbb821f2cc080046456ce3e517db2e96c83cbe660200b301838729b1cf2fb5bd1443d1b028c6478000"], 0x1}}, 0x0) 07:02:47 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000080)=""/138, 0x8a}, {&(0x7f0000000140)=""/25, 0x19}, {&(0x7f0000000180)=""/96, 0x60}, {&(0x7f0000000200)=""/221, 0xdd}, {&(0x7f0000000300)=""/61, 0x3d}], 0x6, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/84, 0x54}, {&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000000480)=""/86, 0x56}, {&(0x7f0000000500)=""/241, 0xf1}, {&(0x7f0000000600)=""/95, 0x5f}], 0x5, 0x0) 07:02:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff0a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x219, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff10000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x300, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff18100000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff19020000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="020b000007000000000021002d5403622a0c000000e2ff004d4fe6062cf6f0a9bd354c8550001000e0c99f49df0005dc437eed486de90001"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x14, 0x35f) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000100)=0x1) recvmmsg(r0, &(0x7f0000003d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:02:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x500, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x10}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000000)='\x18bdev\x00', 0xffffffffffffffff}, 0x30) get_robust_list(r1, &(0x7f0000000100)=&(0x7f00000000c0)={&(0x7f0000000080)}, &(0x7f0000000140)=0x18) r2 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff20000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x48}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff3f000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x600, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x0, 0x6}}, 0x28) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff40000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x700, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f00000000c0)=""/19) r1 = syz_open_dev$sndpcmc(0x0, 0x4, 0x40) pipe2(0x0, 0x84800) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045542, &(0x7f0000000080)) 07:02:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff48000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x68}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xa00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff4c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x10000044045, 0x0, 0x0) 07:02:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff68000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x74}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xf00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1013.820969] IPVS: ftp: loaded support on port[0] = 21 07:02:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff6c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1014.264072] chnl_net:caif_netlink_parms(): no params data found [ 1014.296153] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.303130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.310017] device bridge_slave_0 entered promiscuous mode [ 1014.432376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.438721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.447000] device bridge_slave_1 entered promiscuous mode [ 1014.460631] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1014.469660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1014.607741] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1014.615233] team0: Port device team_slave_0 added [ 1014.620572] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1014.627828] team0: Port device team_slave_1 added [ 1014.633193] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1014.640466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1014.714547] device hsr_slave_0 entered promiscuous mode [ 1014.781722] device hsr_slave_1 entered promiscuous mode [ 1014.862145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1014.993509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1015.008790] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.015159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.021836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.028184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.042626] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.051579] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.200088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1015.208090] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1015.217585] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1015.224258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1015.231139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1015.361855] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1015.367981] 8021q: adding VLAN 0 to HW filter on device team0 [ 1015.376451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1015.383501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1015.391312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1015.399068] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.405432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1015.416054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1015.423337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1015.423786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1015.438694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.445083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1015.455681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1015.589574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1015.599987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1015.607364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1015.737331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1015.744650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1015.752533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1015.760570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1015.772810] device bridge_slave_1 left promiscuous mode [ 1015.778231] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.832430] device bridge_slave_0 left promiscuous mode [ 1015.837889] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.084665] device hsr_slave_1 left promiscuous mode [ 1019.154696] device hsr_slave_0 left promiscuous mode [ 1019.206736] team0 (unregistering): Port device team_slave_1 removed [ 1019.217395] team0 (unregistering): Port device team_slave_0 removed [ 1019.228103] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1019.287965] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1019.386809] bond0 (unregistering): Released all slaves [ 1019.507448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1019.515435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1019.523651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1019.534441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1019.547111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1019.554606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1019.564315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1019.571545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1019.579013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1019.587751] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1019.594197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1019.609111] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1019.622459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1019.761526] protocol 88fb is buggy, dev hsr_slave_0 [ 1019.766628] protocol 88fb is buggy, dev hsr_slave_1 07:02:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$EVIOCGREP(r1, 0x80084503, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f, 0x8}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) r3 = syz_open_dev$dspn(0x0, 0x100000000, 0x101000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000340)) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000400)={0x4, 0xde83, 0x8, 0x185f, 0x2, 0x1c000000, 0x1, 0x3fe, 0xf060, 0x0, 0x0, 0x4}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000940)={0x28c30f3b}, 0x4) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xffffffea) r6 = epoll_create(0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000200)) ppoll(&(0x7f0000000140)=[{r6}, {r4}], 0x2, 0x0, 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r5) 07:02:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1018, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) 07:02:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff74000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff7a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1020.031506] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.036669] protocol 88fb is buggy, dev hsr_slave_1 07:02:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1800, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) [ 1020.072375] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.078057] protocol 88fb is buggy, dev hsr_slave_1 07:02:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff85ffffff}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = dup2(r0, r0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000040)={0x1000, 0x6, 0x9}) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000001340)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1228}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) [ 1020.472667] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.477933] protocol 88fb is buggy, dev hsr_slave_1 07:02:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1810, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:56 executing program 1: r0 = socket$kcm(0x29, 0x3, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:56 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') getxattr(&(0x7f0000000000)='./file3\x00', 0x0, 0x0, 0xfffffffffffffd7e) 07:02:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffffff000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x7, @rand_addr="c376db73f5b2b72f48c8aac7273d8e8c", 0x1000}, @in6={0xa, 0x4e24, 0x9, @remote, 0x277}], 0x48) 07:02:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1902, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffffffffff85}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x2000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3c00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = dup2(r0, r0) accept$alg(r1, 0x0, 0x0) r2 = dup(r0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000180), 0x4) ioctl$TCXONC(r2, 0x540a, 0x9) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) socket$kcm(0x29, 0x5, 0x0) r5 = getuid() r6 = getegid() mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x80, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@smackfshat={'smackfshat', 0x3d, 'filter\x00'}}, {@appraise='appraise'}, {@dont_hash='dont_hash'}]}}) r7 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) sendto(r7, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000100)=@v3, 0x18, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1000000000}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) epoll_create1(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) 07:02:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3f00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 1: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x3, 0x3, {0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}}, 0x32) 07:02:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4700, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x5}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) lseek(r0, 0x4b, 0x4) r1 = dup2(r0, r0) socket$can_bcm(0x1d, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4800, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:57 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @reserved}}) 07:02:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4c00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) clone(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000140), &(0x7f0000000200)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in, 0x5}, 0x90) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305616, &(0x7f0000000200)={0x0, {0x9, 0x9}}) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x44045, 0x0, 0x0) 07:02:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6100, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e1d, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x10}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6300, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@mcast2, @loopback, @ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={@rand_addr="53c0198f60efe9d32fe03fe054fab6df", @loopback, @rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) 07:02:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x48}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6800, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0xfffffffffffffff7, 0x0, [], {0x0, @reserved}}) 07:02:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:58 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:58 executing program 5: 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6c00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7100, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:02:59 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @local}}, 0x10000, 0x3}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x1, 0x1, [0x403e19b5]}, &(0x7f00000001c0)=0xa) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x0, 0x40, 0x8e3, [], &(0x7f0000000000)=0xffffffffffffffd5}) 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x68}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7300, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:02:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7400, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0x5840, 0x44045, 0x0, 0x100000103) 07:02:59 executing program 5: 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x74}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7a00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:59 executing program 5: 07:02:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xff00, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:02:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:02:59 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0xfffffffffffffff7}, 0x8) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000040)=@ethernet, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/184, 0xb8}, {&(0x7f0000000180)=""/159, 0x9f}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/137, 0x89}, {&(0x7f00000003c0)=""/102, 0x66}], 0x5, &(0x7f00000004c0)=""/115, 0x73}, 0x160) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:02:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x100000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:02:59 executing program 5: 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x6, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r0, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x1fe, 0x3, 0x6000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) flistxattr(r1, &(0x7f0000000040)=""/31, 0x1f) sendto(r1, 0x0, 0x0, 0x44045, 0x0, 0x0) 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x2000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x5000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) fstatfs(r0, &(0x7f0000000000)=""/243) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000100)={0x1, [0x8]}) 07:03:00 executing program 5: 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 5: 07:03:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:00 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f00000006c0), 0x0, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 5: 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x5000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 5: 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x10000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1f1a, 0x90000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) r2 = dup2(r0, r0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 5: 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x18100000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0xb1, &(0x7f0000003480)=[{0x1010, 0x103, 0x9, "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"}, {0x28, 0x107, 0x34, "8fdce413b815723bb6e716531abc3b86d68296cab10d"}, {0x38, 0x107, 0x5, "6b297b3ab0929a84a97d476be1b7d526f4a83fe389eda7db1ad91b8622dfc14527aa7447d833e7"}, {0xb8, 0x119, 0x6, "0d7c54f31dc9a693d1416797583c8fc80d71b89595905734d97ad315115a8438b4e31b3b402f6172a6b6aff940ae83ed7d0f37528b65a3ce92725c0d4cd72a5cb2621a825fff89968b52be0f2e689ead2e9aa58139bfbfb04410ba42afedb70cab771d14afdb3a56d47a208dff969cbc867586ddb77f75aacb0edd8e235cd958e304c9cf6f800fc59476030fbdb5884d86b2922c13328958d236688b0d8228a9ddb7"}, {0x58, 0x100, 0xff, "601b0fcbfc96c8fd0b13da616cc696c3667373fc125debda64bc25df37bb9706627ba10b2789bc8c50539fe33a994c4f71f33ae86141bdc223332e35898cebd68dbd82a6"}, {0xa8, 0x100, 0x1, "df0a98a3c999dbd9cb86cdb622b9cc38b819b44f222804de9ef629d8ef32fead4c856f1e1e5195d30bcc7d37d124bc78872dd4f98b3293d5f75551b2278cfc05885f4b7607f3d2235d8ba81dff69ea71bb0151a404a6375bb408d27bb814b8a5e92000fc962da4e0fc4bf9bbdc23c68e91215bf1f0dcef0ef2755a06c4132bef493cdd6e4f6d7925e5c9f408297682c15d5c8081"}, {0xd8, 0x3814ee4796f71c79, 0x80000000000000, "9e74f491e658d34d882f3806f914621519c46fbb71d412fac6e5e1a611385e1e1c35b797d04914e62a418cf695a93dd6160fbf49fb36393e3a567c2393c5dd2d98c577ec815fc5e14deb858f6cd93c69e30165ffef2f5849e45ef9f1daa9416f6f12050bc49bbceca7773b4d2cdaaaeda45a8724ae33a57dee92e1f9086d09d0205374543b26a5bece8fab0cd328bad5f7e906dac0468a7a100dbc5f17bc7aa103e468e4a91f7fdad3b98143f88e4266178cab3e0cbc2e9d476b36bf9056e530f36355ba52"}, {0x70, 0x11f, 0x7, "8fc5a49f5c7692db51f0b59d9aa4a27cdf2aa4c00b4933a4bb796ac9dbe989ea605ccc7cb078712e98d7bce9dfcea934aaddfe8c2ac92ec13a7e09d683aea25d3093876ef30a68f8c6aa5872d05c745d727d7f8918db94bce0670cd8"}, {0x10, 0x11f, 0x0, "970869cd39ede14a231ee90c17a5dd7a4bf0c28278aac0aa0d37a2a5ac607be05b77ab29f3caad75ac2e24c8789c0711bd7ab7619be5cc487570523a3500f1542ff0da3c218f2e02c12da4e1204e3851145941329ba9794e36afc0a4ae9ff45e37676b3f0423d5e971e704f1b7664d4f6d8d"}, {0x68, 0x11f, 0x8, "5a5330a8822d74cfe5777379feb819c4ac72d16f0ee728990c0fb8ca1755fb84d7ee16bf566627d467b88270744660063b16b43a1eed98222fb8dada6c45b52e4c408cb759d7cfdc31cd488b1cfc60730cf46e433878cefb"}], 0x13e8}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000000)) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 5: 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x19020000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 1: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x10080) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xffffffffffffff80, 0x80) ioctl$KDENABIO(r1, 0x4b36) r2 = dup2(r0, r0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:01 executing program 5: 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xa000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x20000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x581a00, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x3, 0x7}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r3, 0x2, 0x101}, 0xffffffffffffffcc) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0xffffffffffffffff) fchmodat(r2, &(0x7f0000000300)='./file0\x00', 0x85) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') pipe2(&(0x7f00000002c0), 0x4000) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x100, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x297}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) 07:03:01 executing program 5: 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xf000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 5: 07:03:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:01 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x52, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000000000)=[{0xd8, 0x11e, 0x100000000, "cc216d9a2353f8169bdfd60611b4e05c817c4fbcdff5b166fe6007907c70a62ca7facb35302ffd4f82a59c6aeec0df6fee4859214e68d4f1173a56471b50782c44a0cd834f4d837170f3b402407312e5f5b0214c81e754285a4496fdddfc09311bc1a89f79ede03a372221bfc4bec53b46fb99617c1fc011a9bdd1c8c8cac0b9abd4044375a84d6cc7da7295fe3a8b5c10aa1bac593c305bf7f390709299991f708324a17e22a6c01bbfc6e5064363354e46550a77c9347522517d327b30130df29cd9"}, {0x70, 0x117, 0xf, "24feba2aba76365d98f250b40d9a93a31d0df8f4d09e1e342e84d0e7775faeb1c7f1b861c98bb3de79ae52b0274846ee898476a655872b974e8b9816d254e89b7794495e0e8a0faa46e1f6af923283f50169dfb2561c75565d079b0fcc8b31"}, {0xa0, 0x112, 0x3, "9cce65c28b80c974ade73cccfa01d0f006da43789b4d15ad66f2d32fa361a686405416c3f7f4ce2f0bdac3a50bd857c8184ca37922fb6afc26fabba5b06d923e3eca5bf07b0607827b2c961046db4ff1e170cc398126fffc94dda0017f060a0ce918590e235d68792da6b808ef4256a6cb4eb06a1f9737c89747692fc2da9d0ae7b9224f46946f10c7c852"}, {0x10, 0x11a, 0x100000000}, {0x90, 0x10e, 0x81, "01c60cff244871e517c22fca427faf9fe6e8eea05ece5dc95ac022b156751906193431edc518da05c383c151789ed26af28c2782b06b0236b5eda01c3349b4f242b80148ca24362501c5182c5b99242adc85a8d61dc2bf904baa8e6002f65818baddb75289d21e75bed6f572c29b4a2d6a7df7427daaaac59fd7b63031b3"}], 0x288}}], 0x2, 0x20000000) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:01 executing program 5: 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x10000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x40000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:02 executing program 5: 07:03:02 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001680)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @loopback}, 0x4, 0x3, 0x0, 0x4}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000080)="261099bdd074826e04d15403bf7a1cf2dec97a5aa445bda288ea4e06cd", 0x1d}, {&(0x7f00000000c0)="e710590a98841803ce698aee869963452eb5bcb1c2b32f21708623e8359d06bf63f49edc8017f04ac5bd11876b11c621153d9aad1f482f804064758855c86461ef32c3886611461fe91c8f3fc765148cc35f5c23acfa213a3a2b82f6fef26586916f43047814ed78ad3c1bdac5e641cb9e131641722c02415a94bef315cd39f62cc748ea7e9ca6bbe1f3becf7b75d861a409dfab95181b1586fcef6d28a6990be138b7eff49d9805d542142b6fcc02859b6d73455c1daf98d3ab178b2c63a8b966b7d2ce5f89409c0b5f99d3d1971589266ce6151c1717", 0xd7}, {&(0x7f00000001c0)="607c502bca4013ef9e36db3e1cc4b05f61ee285233a2619face7d27dda74413474b6aa46ba7008a2c06e28d45098662ef5265e9657ac7b6132547494ab12be741af881c5d72da11e31c3b9442e5cb881cdff37267f778b9d75c4db7daccdeac63c189178fadf7a2361f7169876d6384954b7dffb94b3125a515bc02fa88d8819df6addd14dceaf13a5f092bdc1e98d5a98553c04aa85202a7ab3a65611d0179ea9f2158aebd549a0d92341977573267256edbe574de89513b0378add6a04853bb4e180d2eaf168bd3e11985b31f61a497fb0bea1456c75d4c5de71a5099a3c8a30b548a215b778de26748d2742e5bed57030b788fdcce4433d", 0xf9}, {&(0x7f00000002c0)="4c002c560a2734d48e6da1e1499d68a6e9355911cf56ee12c6146e7d6d967858e9c78a4f36171f5a06059e11b26b88e041db46eb6a29cc31297c416d219859a86a59d331637d6f5c8b17f4e911857fdce054b21583ba27f37304405630fb3296b8c1c2a5d92f2cff44a687255a45385eebb09f3fcafc92ae6ad9a8f4", 0x7c}, {&(0x7f0000000340)="d33affc1864f21f63fd37cc36b64eae0d83277f71308650340167b846bc568a4c2df3270b143cdf343c40e79be07facb97a0d68e29261403dcab0012e44df96b7017b5d89cfbabb622b93c1a589c1748d1fc5420147b7b46955eae50c5e1ea0cb9956c229d407ea22328d6dbb9d83df35e1db6d75865f59c896eb4cb8f2098a190689d7a7dc886fef07e2a942c2ebb174b382df3eb26869c0c353376818cdfb684bb6f31487ef8fc871da84d266c6134105ebe099f7aa6e422e0a27311560e88387915875d76978d74ea9033143c8121994476b96d05351584e6b183daff2e9c97c0334d1391d3e6f13386f4df8c0b394e5b6920249402815fa2a545340d2dc313d22de513f575434d1e727c6863a6da8d6ca02db7adaeb74dec4edef6c0d97e8beaf0ec120c892bdb6eb79ab52e7fadd21e97b33db17af473ba50abee83e27877648b9dcb41b88cfebb252374db6491e24750fe2d53dba74ad5cb976cb45c46f15f856dff7f584c93640dc2f5b674a7cea322c7baf37c834da94801566c7f93042f3555804a7b80875eb754a4b2613016038f10d06a86dd4bd9133d4564b998814fbd68a7cca65887fe9ef1b492253ae87ad6b9b1f93d9942f4937c1304dd063dab9b493954c248fad958809986e436cb1e38ebf78e2d1f8a41ced3708ee1fd6d9971ccc3943a09a4f18893cd7867d486cd1a451c697fe6ac06a203617504642215e5b9573bb45c886541b7f79f950d05ee1918503dc2a66cc960e09d00bc4f45e63fd291341d0b4265e038ef7b40b65fe09d056fcc337c9ee0ae0ecab160156694e13d8c6cdd7a381942760634bb41642804ca68c8d466f6d8631aa17a1838cce108d74e4e4a1a7ac69936fb5694357969579975658399630fe879875e5a36860014d40a88e7c0485b22070851371634dbbd5e7c944e572b88719ba29d1ed248ccdc2b0b7c20a99788f46cda5dad8a94d570d2e323123cb7364e64d29f9edfd0549d74f9309b61c219d04c5550f83c24f482f3af2ff14cb7aea4e7a13228749e6898b5b47d8c1e9db4d6fb022ca52d369b8d5cf34a31473fd7680920ad2feb90f6ff62c4156607045554c870c3a915c2e11e8434fd1fd63c2ad9520e0628ce871b75768ee7ca3790fdfc741c1e225694bb9facd8c64aa2f1f4e8ba371d18d776922eb09743b225b025d48d9ad5ebae70cfb405d28eee3d1ddd5e768333f8ce14910d17c0dd0b21846854cc7d4854a5a46d0ebf84fd069706c9a48ff7d4d52020695569a5fe905e071aa99ea7070c2d551eb35185857c5a7a9806118aebc9af7bbf7989a034214c1251abe677062f001998cb097ee6246b7e621f602037a39eea1a426f523c6fa6a0c5f9441b46476d83f31b586776b4e80a0b1a26b8d4e4fd6b5949023d2baf78ab6e03499902623e782d7869203b5bd7f7b1f21b60bbc4277df40335289aa2b945dec81d9c45e8176667b0b15b01aea9fc97d267cd4dcae7c05e2b58d9f7461ab094ab72d9f23cf3edbf066d05bc0754795fd16d03fd1c90f00588634112d0ee937a87b5329ef29fa590d84b1a172a5f2b522936039f3a0dc456890c4186ea76a25e9556161941fdbd2da95d55828378ebe549f2cd3997998ce43f9ff4a20849fce701940b378a3401bd6fc535d97b2f3fb629734f071c72c1365c40be6200b473bd0e0d46462d2dd77f8ae151749a1724766c4d60903ffbe2226f1958c8019e3117991ab6b46c1c0841b3b8d5d5d5d2b5893e81a2757cce6d97c726e04e36fc442d122377f0eb18d929b7c5978b82db001d0aa5e7b8d5aa0b555884e541e4f25feb1dcc780d4559fdedc7e7583bd65aef93429abd3b25b86b03dba9e1f76371c2cce327b7c589eedb4251db87ca43fdc8547b4ca50167db5b8575bbeb92daa5094f5bd399a92b532b7d617bad72590fc6fc84a86361898295a4f39c60811f2eb5801b99faadb4fdefe3dabd09605c26a17bb1a35c3ee7c91933a438451fba1475e7596511ef902b552c9017663f44fa3de5a138b2230f01c62f6d0709e8ff2b551444c3493ab68d42763b2eceada01d92d23491403e1541bfe4974abe5c961f807942e995b536e369f0e1f4175e600867d6a790ef8bd58c865daa59b66534dded5e27e588aea3d1ed21e84dab5ca9b1944a3f9d0f419f66d752b258fab8d8952dac0382ac16b9ee43d65ed76b09ac62557f4b3e041cab2f73405d1923c7e1771fe9d75de104a8a8ac875b432095e06d7cdcf39cfc9bc2f54825458e063743ef6ccc9e154e0840df08d4ee95f64669d156fb6bbb8e5ed0a8482eb28a15502c9eed8e1a20ed4b79f0e946554e9e0f2a1bc687e7e8e7c494755b1b3bb4b4507b0cbb4cee8a969931d4891fa0a9f44c74337446555c632d7f8030dd90d22a362ed874c59bd4d7a4c3b4929f7b871e33472b7e7e4a476383487be3cb827cb4b924427b27284aab823cd26e6942eccd42d48104c96b0f232c4fc2c7a890d6971fa75def696ab2c77abfd649f523e0323195739316d277eda42165084961a7afac111c6fa35886e33c6f77e6613403cc94d0fc0b99fa6313ec129b11b3f0b79f6ca8de7aef9902f37139b47127f832eef99a97005e6a7ad35ed3153f74ae3b925692249b8e006a8ce7b39c1f00ebdc1a8812440c777285ce23b24b346159d4d7da39c9bc74c8e4c8d3b8ce950f160ac6ecaa1c323029d75b1304e4f3c5ef37460180ece8a9af9eae70b370b8acf6c37ef74d43613798938bfd748d5afedb8c3bcef17e82cf1aef058e81abfd92583d458346f4d4f96dfe3660275958853bdc083d61fdab991745f51880385ebe888cdd11e0c5be2ccb8589924b550512a1870b87564a695e2f7cffb357a4ef58c0f715db1ae54291a11dd6d77c8606b7fc2cc8325dea87d7da1bb2a43263db4377305450c9a3eea33498c4f87d2e5b7dacf36063b451764e828f1949cf7b8cf3a70716007410b4217f898dc8fdbf111c80af9823d688f62844f2297730c03628c15a983b08266fda2b0fac2c4e8beed158e595f21e40f10ff91f9c8712f6219338c4de843d8f4808b2cd0074032c0ef3293ad2a763ca05098e0adb04bbb06c4f080fcd266ffcc9db46ac3a7166fc96fd3afcfac1e6ba10004de79bccdd7d624994d1d2a5a04879ed8aa84dd637c9dab01d6e8e71223382ef195b49af51119faed4daeb325927849282ff098a8ddb539a723cdc581e9b11acb7611ebb67d475a6bc96d480baca90bfba93aa7f3388817f2aea2d43b48eabde6578c1998b0e25813f1b5f105ddb69d21e3d9ffb1f152f5ec02ce9799245cb16eedf1a01cbec989e69793534e4b91be15da6bb680c97241cc93f26be5d64791fd447044d9e47b534fcb3e12e96699ec8a031974adc380998cf7106a95777c9c7600f4c1ba334ed23d5257a66ee29d9eb730c0baf2224a9114ad8318762b87ee20aa63e3a287553072518346c3f63286f846268af19fb241a8a9a665f4b0a8bc946d393ee0d85fc81da54840d06f33182861b0b4e1712debb1e6bac0c6f5dbc42d1537c06a4ccd8f0bae35a388d5464acc6756e4e9444d68fe61bdb6c1e41d13431316fbdfa4587495df1342a9c7fd3aa40435f9348c2d25033f765c5fe3c9aaaaec0212b2a311bdabc6f6e7338888819dc9cd9e8f2e494615d4758c10d08748117135520347ed3b7ea9e3dc93f5072969c77726556d0ff3a2575008c7e4e174b5d5d5a130cfbf0e513df1a40a3a0f51b3cab1e80d4a4ffb260c5e53e181e4079e453d6c9aeb87c81c824c1d04c461afe602507ca4affb2991635882fb865775c7a8c56db2baf17511961d8a59817dafd6c986e3cf93a91d3b6be3b0af4358b6c61adda986f5023e57523d56e86bae5b7d9f2ffe279fc5754677046a24ef7032ba122a31e4438a61780fdefe99bb7656e10d2c78032b3c0022a8c8bbd02925df3b6a2792afe0194de9fb3414a69e71c17e06ba2d6b99143c24558b31be5ac7f2091dc0f3d11ab0b6722059d050d782a2553fc9758f504e138484ae190a7bb78a174264b2afa9293693b497ab1e8929af680219de3fb871946f4c7f65c6551fd2af8bb32da39cc77bbd0faf6bb570f0dd2de08dc8e9c8e7a1bd04123cecf4f7e5b93fe45aa8ffa263ecdc0d5421982f15fb6834ef6dede173caeb19d5315185d09de7a26d2b7e29e1c124b6a6de8d446d50336f5627250cbe1903f1f360a1137af4570e50d84af6e8d8697ecd27493fe2c9ef8f8b7d179e8f2567bcc2ce64f8246c6250da317671f2c7ae2d735cc27e27637add2c542ed4af1efb18452a2199a70154e0cf0f585bae51a5ff9ca202a01e2561f519325231b1f7805128d55f4b162ea7459b05bb6131d17ca66b90e162f053b9d2b264fef6729d3ce120c62cabbfc78cf023b25cef49c1ca2836ee40c673e17e374df6fd021798517b599f3bac6cb28f0df982983d0763728f293db38fb3e6d584f7b9c0c1caab335bff4f8f1babb93003306bfb768378b3eb55b5758685bf76de7388e245c84862681e34b8e0309730ca48275b29502dbec7bdca488aff98051e07da3b61cc49213d7e9bb001fa4325d4a025e6235dfc0ab80c3d7ff2c745a64f1bab28361cf536cd505f0b50de27f74c1a76f4dfbb017184b1973014ee26bcef058a3c900356202118f9a44845c038e88fd745a3f6352c8571d697c170708838a062a875970a35569ee00ac97628f30b8c0e3480891424e7498473aac8a55ea56d3adb20a7a8e5e6cb4b01141d128dfbb6f5ff507e827c2b8adc4c839cbcf404f34eee5d01f29a75f860042ff1de0910e73e103aec02cc6611f810fd2a637cac698296c4616cfea43d7405b588d1a7d956027a8733eb0503bcd6d22160eb72a59280aa1f0b0826cce5c16cffadd814297e1ca218e97cd00d86a76e685842a11ef9f0a8ef98ac9d248e02da2b2a8b4b32c1a491b71edbe88ce2ff8c9d3feac0febe690d87e0521e4795012555ac0729f0e80b4d8c22f8f29afee87e115c466ce6ba085878aa962b56b6131d00a2d5c92a0a73a41e51281cc6ffa64e11a8792f8f0fb4d403bcfa371fe612ea02b5d78ee900fb59915e0079027de82fed8355a88e7893acc3b5f0c0e7b5be8c98072b0638d6d3accdf855d659439dc9288797efaa4fe5daae6f699ac155ac75e384e19db3045b9a9cbea7e227280b10224553d32243396fd2227c63f54b7133272bd1b917b224f3d8a5ee035a451ee7061942a45a3e5508ed2460dc35c9d97281f8fddb9667ef6ff3e0d5306dab3687d0e11c0f62207b1eb9a13af839acb243cb2ad740aaa1823da0530b2bc65241829e02000032fc82666c625237e7dc620b38466fee015ab9ef9100944d640d1a97ab1512d5ad79da5105c4855100cfa7d8bea88d00a51e0521b896596dd9210eae1c98b7e3c10445d5705772659b52bfb84854ce5ddfa4e5e8320fc7a2434d5615b1486c169a843921768684cdd9518948fe158aa1c2f57d7357d53775828ee5c37abec40a0bb31363b0241876ff52f7d60ef8c0807f819589c0d38bef1c97ed7df6640d1a4e25acc13196f3fe811732d4864b486f5f3087c9f8e65763bd89bf1bfbdc7a7716428d55ab718bc4dea546330418a73e5b503da5777f909c5712065d0f4eecf2dee5564c61f67b5b28cdbf5689befa2cf69030b60acc7da11a21bdaf7e3e9773ba3d4856af1d41bf594a68071b6fb9d956456719aa577755e4beae937c13c905708204d8fa99375133256a1a3573394c53ba1bf33a82a492e7b82e0020f159ac0aa5b6e4b", 0x1000}, {&(0x7f0000001340)="debdbfb29c897e3faa56595fcf45c3fff488aef4ce82325bd0c38b27dc8941e0f475462bbb1c8725d0ea5c1b5546f891fbcc1cfaa95347", 0x37}, {&(0x7f0000001380)="b4de62dedf08e3b95abe6664087fe147f6721c4d830ef769591097e88284f802465a936cb1aabd53f81f033cde2f62b398f3e1f321ff67c79371067dbf3c6d7f2dd5b8ff9a73f196c06572326d2a35df9ff4b4df157d5186c6e6ebaabf8518e313adc14d10a51e1f387f9e1f0dca0072a8fe2fb09e8a27333ddd1abed821c702ff002d8872062ec8b64e4cb4fe7af35df2110fc8d10abf478216e105e040417bb4e543e0b23ad1fbe31308c79ff6f6d6ff208b9cfc9950c69bd4afb4", 0xbc}, {&(0x7f0000001440)="cded8d594657ade3f99fbf92af832044d8ce36737c570f9d02d6e993bd89826e737dc026f468417cbaa96279348112717c628438e5cd1821c51ec1dd0c4ae1fd6d8f6d789d9c099df649a7e432235278f50ecf67c775bd9af4a33b88f2e2458f25a54e789374dcc42265de96e4cd5f7f4760ca7b90e6d5de92b4543489fd47d7a546b05c493fff947f5b23525e27db6bc45662520b76f29ce0f2f8115f720ee56615daf7f6668473800426d678b2c77e323cb0bbfa0c", 0xb6}, {&(0x7f0000001500)="f617e5def0b2ac5b3fbb189ff0879b9b608642ce44ce14d07f9f8e92feaddfc9b9750b135b70df1b324cc927841ef414abb3576c79c6f644560c5c3dea77abf261b407f697cce44b3ac63ff252af252bbc04709e57e792bad84e3a2120694ffed496a27c27bec3185d382748984da34482479f8e5a1fe6c5e417669d69c68d67a3e123b6c5d81b91caf12ecb5ae14b7767c11810a0101d9f2dc215a2e6", 0x9d}], 0x9, &(0x7f0000003480)=[{0x1010, 0x119, 0x0, "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"}, {0x58, 0x12b, 0x6, "ebe73cc732d2b46a9681d5b3079751f50d3d1c7fd4051ab44a065d37b4c92a5d09a7f20f3a83e67e46a7289aae090e10ab3fa0c5bc060094d6dd71ecfb8395edb4e115ce"}], 0x1068}, 0x9}], 0x1, 0x40) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x18000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 5: 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x48000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x18100000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:02 executing program 5: 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x19020000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 5: 07:03:02 executing program 1: prctl$PR_GET_TIMERSLACK(0x1e) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x8, 0x1]) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x8000000000000043, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x16, 0x14, 0x16, 0x18, 0xc2, 0x0, 0x1, 0x1d, 0xffffffffffffffff}) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000040)={0x675}) r4 = dup2(r2, r2) sendmmsg(r2, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r4, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000140)={0x4, 0x0, [{}, {}, {}, {}]}) 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:02 executing program 5: 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x68000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x20000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:02 executing program 5: 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3c000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f00000000c0)={0x8d, 0x47c3, 0x2}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x64, 0x4002) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x88a38cb6e6de5ef2, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x80000001, r3, 0x0, 0x7fff}) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x74000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:02 executing program 5: 07:03:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3f000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 5: 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x40000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:03 executing program 5: 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 5: 07:03:03 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @loopback, 0x0}, &(0x7f0000000040)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', r2}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x85ffffff}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x47000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 5: 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x48000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x5000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 5: 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4c000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x111800, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x23}, &(0x7f00000001c0)=0x8) write$eventfd(r2, &(0x7f0000000040)=0x5, 0x8) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:03 executing program 5: 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xffffff85}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x61000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:03 executing program 5: 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 5: 07:03:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x100000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x63000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:04 executing program 5: 07:03:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x200000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x68000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x300000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x10000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6c000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 07:03:04 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x80000000, 0x400300) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="380fba9314e4a1bf50407f8a0c89f2b1f728fecd62bd89fa99b79cf4b942608761034078aba6a9", @ANYRES16=r1, @ANYBLOB="04062dbd7000fbdbdf250200000008000500010001004000020014000100ff0100000000000000000000000000010800090001000000080005002b0d000008000b00020000000800090074000000080005000800000008000600ff7f0000080004000300000008000600810000000800040006000000"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nullb0\x00', 0x20410081, 0x0) fcntl$setpipe(r2, 0x407, 0x5) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000240)={r4, 0x25ef, 0x4, [0x0, 0xfc3, 0xe71, 0x1]}, 0x10) r5 = socket$kcm(0x29, 0x2, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x7, 0x400) r7 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$selinux_attr(r7, &(0x7f0000000000)='system_u:object_r:cgroup_t:s0\x00', 0x1e) r8 = dup2(r5, r5) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x4, 0x5, 0x7, 0xfff, 0x0, 0x3, 0x500a1, 0x4, 0x6, 0xfffffffffffffffa, 0x10001, 0x3, 0x8, 0x7, 0x800, 0x8001, 0x1000, 0xfffffffffffffff9, 0xff, 0x247, 0x779, 0x20, 0x2574, 0x20, 0xc7, 0xff, 0xfffffffeffffffff, 0xfff, 0x81, 0x5, 0x0, 0xffffffffffff4408, 0x2, 0xb1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x20, 0x1, 0x1, 0x9, 0x100, 0x6a84, 0x7}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmmsg(r5, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r8, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x18100000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x400000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x71000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x500000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x19020000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x73000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:04 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x1f, 0x9, 0x80000000, 0x3}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="ab00000049b722a4f7a419dcfd90b8842d02d5ca8b5bdd2ef2cda856ad504e2fc70f585ad06842a1145b4a0bd4a18bae972eaf9e53f27f456d33d10a1a6b18ebeea600b6adbb55f813360a1e9485b2c0837de3817076d21a84923f6a09092e185301324176aa3c89d90a93a7979bbb850bec7ca86661ae00cf100202d25054d3deccdad356cb94a36b404ff1b4b99dc65b4d5158f54b00000000911522935330fb68364bdff1b1c5cddb0000000000000000"], &(0x7f0000000140)=0xb3) 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x600000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x20000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x74000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7a000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x700000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:04 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x40000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x85ffffff, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0x2) 07:03:05 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x48000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x9cffffff, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x9fffffff, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x68000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xff000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1810000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:06 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x200}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x8, 0x30, 0xbd, 0x1000}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x200}, &(0x7f0000000100)=0x8) 07:03:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xffffff85, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1902000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xffffff9c, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x74000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xffffff9f, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:07 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x10000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000000)={0x4, 0x3, [{0x10001, 0x0, 0xfffffffffffffffd}, {0x5, 0x0, 0x9}, {0x6, 0x0, 0x2}, {0x0, 0x0, 0x9}]}) 07:03:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x85ffffff}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x100000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:07 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) r1 = dup2(r0, r0) fchdir(r1) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) bind$packet(r1, &(0x7f0000000200)={0x11, 0x19, r2, 0x1, 0xffffffffffffffff, 0x6, @broadcast}, 0x14) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000000)=""/140) ioctl$FICLONE(r1, 0x40049409, r0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:07 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4800000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x200000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:08 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xffffff85}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:08 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 07:03:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x300000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6800000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x400000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:09 executing program 5: socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x500000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x100000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7400000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x200000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x600000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 5: socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x700000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x300000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 5: socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x8000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x2) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x400000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xa00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x500000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x85ffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xf00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x600000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) getrusage(0x0, &(0x7f0000000040)) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000000)) 07:03:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1000000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x700000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1800000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x2}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040), 0x36f, 0x0) accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 07:03:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1810000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xa00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:10 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) r3 = fcntl$getown(r1, 0x9) ptrace$setopts(0x75f89bb5675b41f5, r3, 0x3149085, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r2, 0x1}, &(0x7f00000000c0)=0x8) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:10 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x1902000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r2 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) timerfd_gettime(r2, &(0x7f0000000040)) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$void(r2, 0x0) 07:03:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1810000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x5}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x2000000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:11 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x1902000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) getpeername(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x2000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xa}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:12 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200100, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x5, 0x2, &(0x7f00000000c0)=0x4}) r2 = dup2(r0, r0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x200002, 0x4) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x8, 0x400000000, 0x95, 0x1, 0x1b, 0x4, 0x3ff, 0x5, 0x3, 0x4}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000000080)}}], 0x2, 0x0) sendto(r2, 0x0, 0x0, 0x44049, 0x0, 0x0) 07:03:12 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x3f00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4000000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x10}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:13 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @empty, 0x8, 0x0, 0x6, 0x100, 0x4, 0x400022, r2}) unshare(0x8000400) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x81) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x10000000000002f0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x37f, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0), 0xe}}], 0x2, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xf) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000000)=0xff) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0x29100115) restart_syscall() 07:03:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4700000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x48}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:13 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0x8f, 0x44, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x80e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 07:03:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4800000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4800000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = dup2(r1, r0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x406400) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xffffffffffffff24) 07:03:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x4c00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x68}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6100000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6800000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6300000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x470, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) r2 = getuid() setfsuid(r2) 07:03:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x6c00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x74}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:15 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7400000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6800000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000000000)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:15 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x7a00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r1, r1}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0x0, 0x40080, 0x0, 0x0) 07:03:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7100000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x8000000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x85ffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7300000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xff00000000000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000280)={@loopback, 0xa, r2}) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000080)=0x7ff) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) 07:03:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7400000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:16 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x2}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180), 0x2c1}], 0x100000000000002f, 0x0) 07:03:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xa00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x8000000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) timer_create(0x4, &(0x7f0000000000)={0x0, 0x31, 0xc844b67c733f47f8, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f0000000080)) r2 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 07:03:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x5}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 07:03:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x85ffffff00000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, 0x0, 0x0, 0x0) 07:03:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x9cffffff00000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x40000) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000100)={0x0, 0xb3, 0x2, [], &(0x7f00000000c0)=0x81}) r2 = dup2(r0, r0) read(r0, &(0x7f0000000140)=""/4096, 0x1000) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000004840), 0x0, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040), 0x0, 0x0) 07:03:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xa}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040), 0x0, 0x0) 07:03:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x9fffffff00000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x2000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040), 0x0, 0x0) 07:03:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xff00000000000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x10}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 07:03:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:19 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000040)=0x8) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) 07:03:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 07:03:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x2, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x48}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1000001) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) pwritev(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0) 07:03:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x3, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x4, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 07:03:20 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x142, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000100)={0x8ad, 0x7f77777b, 0xd132, 0x80, 0x3, @stepwise={{0xe71, 0x9}, {0xfc, 0x80}, {0x1, 0x400000000000}}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) r2 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) getpeername(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000080)=0x80) sendto(r2, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0xa4}, 0x5c) 07:03:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x68}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x5, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1400000003, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x9, {0x0, 0x0, 0xe7ff}}) 07:03:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x6, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6c}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:20 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x13d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 07:03:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1044.877603] ptrace attach of "/root/syz-executor5"[25233] was attempted by "/root/syz-executor5"[25234] 07:03:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x7, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x74}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x5, 0x101000) 07:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7a00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 07:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xff00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7a}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0xa, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x219}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0xf, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:21 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e22, @empty}}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x2000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x10, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x300}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 07:03:22 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000000)=0x210000, 0x4) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffeffe, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000180)={'lo\x00', 0x5}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r2, 0x4, 0x31}, &(0x7f0000000140)=0xc) 07:03:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x500}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x18, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x600}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x6, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x401, 0x7, 0xfffffffffffffffe, 0x40, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) r3 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r3, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x28400) 07:03:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x3c, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x5000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x700}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x47, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x48, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xa00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x0, 0x6, 0x7}}, 0x30) 07:03:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfffffffffffffcdd, 0x44045, 0x0, 0xfffffe01) 07:03:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x4c, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1018}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0xa000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1810}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x61, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x1902}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000000)={0x7, "0b513c0d1f0d56187a8487e2eb3a8720be5bee08f895e802271ab27630e559ff", 0x1050, 0x3, 0x3, 0x2, 0x4}) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x10000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x0, 0x6, 0x7}}, 0x30) 07:03:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x63, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x18100000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x2000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x19020000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3f00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x100) ioctl$TCGETA(r0, 0x5405, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000180)={0x0, 0x0, 0x1, 0xc38}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000001c0)={0xc, r2}) r3 = dup2(r1, r1) sendmmsg(r1, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f00000000c0)={0x990000, 0x9, 0x41d1c042, [], &(0x7f0000000080)={0x990a6c, 0x4, [], @p_u16=&(0x7f0000000040)=0x59}}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000140)={'bond_slave_1\x00', &(0x7f0000000100)=@ethtool_ts_info={0x41, 0x505, 0x3, 0xc18, [0x9ef, 0x40, 0x6], 0x100, [0xffffffff, 0x0, 0x101]}}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000240)={r4, 0x1}) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) sendto(r3, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000000)={'batadv0\x00', 0x2}) 07:03:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x68, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1048.425909] batadv0: mtu less than device minimum 07:03:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x20000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x6c, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x0, 0x6, 0x7}}, 0x30) 07:03:24 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(r1, 0x0, 0x0, 0x44045, 0x0, 0xffffffffffffff0d) 07:03:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x71, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x3f000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x40000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x73, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6800}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x48000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x74, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) 07:03:25 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000000)={0x0, {0x77359400}, 0x200, 0x4}) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0xffffffffffffdb3, &(0x7f0000000040)}, 0x4}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f0000000000)}}], 0x2, 0x0) sendto(r1, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x6c00}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x7}}, 0x30) 07:03:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x4c000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x7a, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x68000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000, 0x0, 0x7400}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) 07:03:25 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x410442) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0xff) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfd93, 0x44045, 0x0, 0xfffffe01) 07:03:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x219, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1050.092223] kasan: CONFIG_KASAN_INLINE enabled [ 1050.097156] kasan: GPF could be caused by NULL-ptr deref or user memory access 07:03:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x300, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1050.136496] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1050.142862] CPU: 1 PID: 25483 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #38 [ 1050.150046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.159417] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 1050.165135] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 07:03:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x3000000, 0x0, 0x500, 0x0, 0x0, 0x1000000}, [@map={0x18, 0x2, 0x1, 0x0, r0}], {0x95, 0xffffffff00000000}}, &(0x7f0000000440)='syzkaller\x05', 0x6, 0x21a, &(0x7f00000000c0)=""/144}, 0x48) [ 1050.184037] RSP: 0018:ffff88805580f6d8 EFLAGS: 00010247 [ 1050.189407] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005fe4000 [ 1050.196784] RDX: 0000000000000000 RSI: ffffffff828ba75c RDI: 0000000000000004 [ 1050.204048] RBP: ffff88805580faa8 R08: ffff8880a0a1c680 R09: ffffed1010a264c2 [ 1050.211309] R10: ffffed1010a264c1 R11: ffff88808513260b R12: 0000000000000000 [ 1050.218575] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880851325e8 [ 1050.225849] FS: 00007fef41911700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1050.234066] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1050.239935] CR2: 00000000025b37d0 CR3: 0000000049bc7000 CR4: 00000000001406e0 [ 1050.247195] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1050.254461] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1050.257339] kobject: 'loop3' (00000000e71d65f1): kobject_uevent_env [ 1050.261719] Call Trace: [ 1050.261748] ? fuse_dev_read+0x250/0x250 [ 1050.261784] ? mark_held_locks+0x100/0x100 [ 1050.261800] ? fixup_owner+0x250/0x250 [ 1050.268266] kobject: 'loop3' (00000000e71d65f1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1050.270771] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1050.270784] ? futex_wait+0x6e6/0xa40 [ 1050.270869] ? aa_file_perm+0x42e/0x1090 [ 1050.305397] ? find_held_lock+0x35/0x120 [ 1050.309441] ? aa_file_perm+0x42e/0x1090 [ 1050.313581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.319140] ? lock_downgrade+0x910/0x910 [ 1050.323268] ? kasan_check_read+0x11/0x20 [ 1050.327401] ? rcu_read_unlock_special+0x380/0x380 [ 1050.332309] ? aa_file_perm+0x455/0x1090 [ 1050.336351] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1050.341613] ? rcu_read_unlock_special+0x380/0x380 [ 1050.346530] ? memset+0x32/0x40 [ 1050.349925] fuse_dev_write+0x191/0x240 [ 1050.353877] ? __fget+0x499/0x710 [ 1050.357304] ? fuse_dev_splice_write+0xe10/0xe10 [ 1050.362037] ? __might_fault+0x12b/0x1e0 [ 1050.366070] ? find_held_lock+0x35/0x120 [ 1050.370120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1050.375690] ? iov_iter_init+0xea/0x220 [ 1050.379643] __vfs_write+0x764/0xb40 [ 1050.383336] ? kernel_read+0x120/0x120 [ 1050.387203] ? trace_hardirqs_off_caller+0x300/0x300 [ 1050.392290] ? apparmor_file_permission+0x25/0x30 [ 1050.397113] ? rw_verify_area+0x118/0x360 [ 1050.401239] vfs_write+0x20c/0x580 [ 1050.404758] ksys_write+0x105/0x260 [ 1050.408364] ? __ia32_sys_read+0xb0/0xb0 [ 1050.412425] ? trace_hardirqs_off_caller+0x300/0x300 [ 1050.417505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1050.422233] __x64_sys_write+0x73/0xb0 [ 1050.426094] do_syscall_64+0x1a3/0x800 [ 1050.430054] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1050.434962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1050.439954] ? __switch_to_asm+0x34/0x70 [ 1050.443990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1050.448809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.453974] RIP: 0033:0x458099 [ 1050.457140] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1050.476109] RSP: 002b:00007fef41910c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1050.483796] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 1050.491038] RDX: 0000000000000030 RSI: 0000000020000140 RDI: 0000000000000003 [ 1050.498281] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1050.505643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fef419116d4 [ 1050.512891] R13: 00000000004c6efc R14: 00000000004dc520 R15: 00000000ffffffff [ 1050.520227] Modules linked in: [ 1050.527383] kobject: 'loop2' (00000000b058da89): kobject_uevent_env [ 1050.531822] ---[ end trace ae2198aff2eda65a ]--- [ 1050.534809] kobject: 'loop2' (00000000b058da89): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1050.538604] RIP: 0010:fuse_dev_do_write+0x1e44/0x3780 [ 1050.550879] kobject: 'loop4' (000000008a0e9f62): kobject_uevent_env [ 1050.553637] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 d5 18 00 00 49 8b 9f 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 39 [ 1050.560378] kobject: 'loop4' (000000008a0e9f62): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1050.578706] RSP: 0018:ffff88805580f6d8 EFLAGS: 00010247 [ 1050.578716] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005fe4000 [ 1050.578724] RDX: 0000000000000000 RSI: ffffffff828ba75c RDI: 0000000000000004 [ 1050.578731] RBP: ffff88805580faa8 R08: ffff8880a0a1c680 R09: ffffed1010a264c2 [ 1050.578755] R10: ffffed1010a264c1 R11: ffff88808513260b R12: 0000000000000000 [ 1050.578762] R13: 0000000000000000 R14: 0000000000000030 R15: ffff8880851325e8 [ 1050.578773] FS: 00007fef41911700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1050.578781] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1050.578788] CR2: 000000000070a158 CR3: 0000000049bc7000 CR4: 00000000001406e0 [ 1050.578798] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1050.578806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1050.578812] Kernel panic - not syncing: Fatal exception [ 1050.580032] Kernel Offset: disabled [ 1050.675775] Rebooting in 86400 seconds..